Which of the following keywords is used to remove a row in a table? (Points : 2) DROP
DELETE
REMOVE
MODIFY

Answers

Answer 1

Answer:

DELETE

Explanation:

DELETE keyword is used to remove a row in a table. The actual syntax is as follows:

DELETE from <TableName> where <Condition>;

For example:

DELETE FROM employee where name='Peter';

This will remove employee with the name Peter from the Employee table.

DROP on the other hand is used to delete the entire table without focussing on a particular row.DROP syntax is as follows:

DROP TABLE <TableName>;


Related Questions

Which of the following creates a new table called 'game_scores' with 2 columns 'player_name' and 'player_score'?

(a) CREATE TABLE game_scores (
player_name string(45),
player_score integer(10)
);

(b) NEW TABLE (
player_name varchar(45),
player_score int(10)
) AS game_scores;

(c) NEW TABLE game_scores (
player_name varchar(45),
player_score int(10)
);

(d) CREATE TABLE (
player_name varchar(45),
player_score int(10)
) AS game_scores;

(e) CREATE TABLE game_scores (
player_name varchar(45),
player_score int(10)
);

Answers

Answer:

e

Explanation:

the valid sql syntax for creating table is

CREATE TABLE table_name (

column_name column_type

)

varchar and int are the valid sql types not string and integer

AS is used in select queries to aggregate results under given name

Wi-Fi is all around us. Is there any downside to its pervasiveness?

Answers

Answer:

  Wi-Fi(Wireless fidelity) is the networking technology that helps in providing the internet connectivity to the users. The Wi-Fi is all around the surrounding due to several Wi-Fi connections the users demand and use. It creates the networking environment where internet access becomes easy.

There are drawback to Wi-Fi service range that covers a large area is the high number of users.The addition of many users slow down the data rate and accessing .The radiation from this service is also a negative side of the Wi-Fi pervasiveness.

Final answer:

The downsides to the pervasiveness of Wi-Fi include the digital divide, security risks, and the psychological impact of being constantly connected. To mitigate these issues, digital literacy, cybersecurity, and healthy digital habits are crucial.

Explanation:

Wi-Fi's pervasiveness indeed comes with downsides alongside the immense benefits it provides in terms of connectivity and access to information. One major concern is the digital divide, a gap that is widening between those who have access to technology and those who do not, both locally and globally. This phenomenon can lead to disparities in access to information and inequalities in educational and economic opportunities.

Another significant concern is security risks. With Wi-Fi networks, there is the potential for eavesdropping and unauthorized access to communications, raising issues of privacy and data protection. As we further integrate Wi-Fi and other wireless technologies into critical infrastructure and personal devices, the risk for systemic failures and technological vulnerabilities increases, which could have severe consequences in the event of natural disasters or targeted attacks.

What is the efficiency (Big O Notation) of quicksort algorithm?

Answers

Answer:

O(NlogN)

Explanation:

The time complexity of quick sort in worst case is O(N²) but the average case time complexity of quick sort is O(NLogN).The efficiency of quick sort totally depends upon the pivot.If the pivot is the smallest or the largest element in the array every time then the time complexity of quick sort algorithm will come out to be O(N²).

Twitter, Foursquare, and other real-time media add to or leverage capabilities of smartphones--improving your ability to be well-informed in real-time.
a. True
b. False

Answers

Answer: True

Explanation: Twitter is the application that functions online for providing news and communication for connecting people on social network.Foursquare is also an online app that works on the social platform in the smartphones and provide the knowledge about activity of people moving through the real-time world.

Other real world apps that operate in the real time helps in providing information about the activities and incidents happening through the smartphones.This also increases the knowledge of the individual by discovering, reading,sharing of the information.Thus the statement given is true.

What is the Matlab command to create a column vector with 11 equally spaced elements, whose first element is 2 and whose last is 32.

Answers

Answer:

transpose(linspace(2,32,11))

Explanation:

To get the equally spaced elements you can use:

linspace is the command for generating a linearly spaced vector.

For instance, the command:

linspace(element1,element2,n)

generates n points, between element1 and element2

The spacing between the points is calculated by

[tex]\frac{element2-element1}{n-1}[/tex]

In your case, the linspace command will create a vector with 1 row and 11 columns (1x11).

To get the column vector:

In order to convert this vector into one with 11 rows and 1 column (11x1), you can use:

tanspose(vector)

where vector is linspace(element1,element2,n)

What value will be stored in the Boolean variable t after each of the following statements executes?
A) t = (12 > 1);
B) t = (2 < 0);

C) t = (5 == (3 * 2)); D) t = (5 == 5);

Answers

Answer:

A) True

B) False

C) False

D) True

Explanation:

In the following expressions we are evaluating whether a value is greater than (>), less than (<) or equal (==) to another value.

A) The expression is pointing out that 12 is greater than 1, which is True.

B) The expression is pointing out that 2 is less than 0, which is False

C) The expression is pointing out that 5 is equal to (3*2); 3*2=6 therefore 5 is not equal to 6. The answer is False

D) The expression is pointing out that 5 is equal to 5, which is True.

The World Wide Web (not the Internet) went live in this decade:

Select one:

a. 1960s

b. 1970s

c. 1980s

d. 1990s

Answers

Answer:

d. 1990s

Explanation:

The World Wide Web is a kind of friendly information system that uses hypertext, and since its creation has made Internet available for most people.

The Internet already existed quite before the World Wide Web: the first computer network was ARPANET (created in 1969), a project of the Advanced Research Projects Agency of the United States Department of Defense.

Further developments in computers' protocols (ways in which computers communicate with each other) resulted in a network of networks, or the Internet, in 1983.

Although the World Wide Web was a proposal first published on March 12, 1989, by Tim Berners-Lee of the European Nuclear Research Center (CERN) --this is why it is considered that the World Wide Web was created in 1989-- the idea came into life at the end of the year 1990, for the following reasons:

After that proposal of 1989, Berners-Lee wrote another on May 1990, and in September 1990 he received support to develop those ideas.Some of the essential technologies needed to create the World Wide Web were already available by October 1990, that is, the HTTP (Hypertext Transfer Protocol), the HTML (Hypertext Markup Language) and the URI (Universal Resource Identifier), all considered been developed by Berners-Lee.On November 12, 1990, with the Belgian engineer Robert Cailliau, who was working in similar ideas, wrote a more formal proposal of such a system to share information across the CERN where they mentioned: "build a Hypertext project called WorldWideWeb" [Wikipedia, 2019].

Well, by the end of December 1990, in a NeXT computer, and after the creation of the first web server and the first web page browser, the first web site, running at CERN, appeared on December 20, 1990.

This idea was rapidly adopted outside the CERN in 1991 and, by the end of the 1990s, more than 130 million people could access the Internet using the World Wide Web technology.

In conclusion, the World Wide Web went live in the decade of 1990s: was a project, a proposal by the end of 1989 and started to work as a fast-adopted technology at the beginning, and throughout, the 1990s.

Answer:

b

Explanation:

Complete the following conversions. You MUST show all of your work to receive full credit.

Convert the following Hex numbers to decimal.

a. FFFF

b. 0123

c. 005F

d. 026A

e. 73B0

Answers

Answer:

Following are the decimal num

a. FFFF=65535

b. 0123=291

c. 005F=95

d. 026A=618

e.  73B0=29616

Explanation:

Conversion of hexa decimal number to decimal number is done by multiplying the digit with corresponding power of 16.

FFFF= 15 x 16³+15 x 16² + 15 x 16¹+ 15 x 16⁰.

        =61440+3840+240+15

        =65535

0123=0 x 16³+1 x 16²+2 x 16¹+3 x 16⁰

       =0+256+32+3

       =291

005F=0 x 16³+0 x 16²+5 x 16¹+F x 16⁰

        =0+0+80+15

         =95

026A=0 x 16³+2 x 16²+6 x 16¹+A x 16⁰

         =0+512+96+10

         =618

73B0=7 x 16³+3 x 16²+B x 16¹+0 x 16⁰

         =28672+768+176+0

         =29616

. Why is it insufficient to develop a long-term IT strategy and not reexamine the strategy on a regular basis?
a. Systems need to be maintained
b. To keep the CIO part of the executive team
c. Organizational goals change over time
d. To automate business processes

Answers

Answer:

The correct answer is c. Organizational goals change over time.

Explanation:

Develop a long-term IT strategy is an important goal to provide planning and solutions to an organization but it is important to reexamine the IT strategy on a regular basis to do corrections on this strategy because organizational goals change over time.

Define the keywords final and static.

Answers

Answer:

Final Keyword:-It is defined in the class that has the property of non-inheritance and can declare the constant variables. It has no re-initialization function.At the time of the final declaration,it is required that the variable should be initialized.

Static Keyword:-It is used in a particular class for defining it's member so that it can used for any object of the class.Static method in a class can call this keyword. It can has the property of being re-initialized.

Some companies, especially consulting firms, require their employees to create ____ about sessions with clients.
timesheets
reports
logs
stories

Answers

Answer: Reports

Explanation:

 Some companies always ask to the employees to create the particular report for the session with their clients.

As, the report is the main communication channel between the company employees and clients where all the information are complied together and focus for transmitting the data clearly.

Efficient reports are basically help in the decision making and problem with sufficient knowledge.  

On the other hand, all the other options are not needed for session with the clients in the organization. Therefore, report is the correct option.

 

In what respects does a UML state diagram differ from a state transition diagram?

Answers

Answer: The difference between the UML state diagram and state transition diagram are as follow:-

State-transition diagrams display the states of the object where the change takes place whereas the UML(Unified modeling language) state diagrams are representation of parts of system at certain time instance. State-transition diagram requires the condition to be accomplished before the transition happens whereas the dynamic behavior of the states are expressed by transitions in UML state diagrams.

For a class Foo, one difference between a variable declared Foo * and a variable declared Foo & is that only the variable declared Foo & can potentially have the value NULL.

Select one:

a. FALSE

b. TRUE

Answers

Answer:

False.

Explanation:

When we declare a variable as reference type we have to initialize that variable otherwise the compiler will give error that the reference variable is not initialized.You also cannot initialize the variable Foo& with NULL value because it is a reference variable and we have to initialize it.

On the other there is no need to initialize the variable Foo * since it is a pointer it can also store NULL value.

So the answer is only Foo* can store NULL value not Foo &.

If (41)r = (21)10, determine the value of the radix r.

Answers

Answer:

r=5.

Explanation:

Since we know we can convert a a number with any base to base ten(10) by multiplying the corresponding powers of the base.Stating form the LSB(Least Significant Bit) and with the power 0 and the power will increase by 1 as we move to MSB(Most Significant Bit).

[tex]4*r^1+1*r^0 = 21[/tex]

[tex]4r = 21 -1[/tex]

[tex]4r=20[/tex]

[tex]r=5[/tex]

. Write the C++ code that reads an integer from the user, and then computes that integer's absolute value.

Answers

Answer:

Following are the program in C++

#include <iostream>// header file

using namespace std;

int main() // main function

{

   int num; // variable declarartion

   cout<<" Enter the number:";

   cin>>num; // user input

   num=abs(num); // finding the absolute

   cout<<num; // display number

   return 0;

}

Output:

Enter the number:-90

90

Explanation:

In this program we have declared a variable "num" of type int. After that we find the absolute value by using abs function and finally display the variable "num".

Left uncaught, a thrown exception will cause your program to terminate.

Select one:

a. FALSE

b. TRUE

Answers

Answer: True

Explanation:

  Yes, the given statement is true that the left uncaught, the throwing exceptions caused stop execution or terminate the program. The uncaught exception is basically refers that the compiler control the termination function in the program.  

Left Uncaught exception basically cause termination of the program and also implement the interface in the uncaught exception handler in the particular java thread.

Broadly speaking, how is testing in an object-oriented approach different to testing in traditional software development?

Answers

Answer:

In object oriented programming methodology, the attention is that capture the main structure and conduct of data frameworks into little modules that joins the two information and procedure.

The main principle of Object Oriented Design (OOD) is that it helps in improve the quality and efficiency of framework analysis and configuration by make the system more progressively usable.

The software Programming testing is a significant period of the product advancement cycle of the life. Testing is the way toward executing the main structure of the program with the help of main objective and also discovering mistakes.

In today world the situation of the object oriented ideas are utilized all through programming designing. Testing of item arranged programming is unique in relation to testing with the traditional programming.

Name the contributions of Steve Jobs and Bill Gates, with respect to technology.

Answers

Answer: Steve Jobs made several contributions towards technology by introducing the range of Apple devices and technologies .he started the Apple Incorporation.The technologies introduced by his company are as follows:-

iPodiPhoneApple LisaiMaciPad etc.

 Bill Gates is the founder of Microsoft incorporation and made a lot of development in that field to create various software for the operating system.the creation of "Microsoft Window" was started by him and some other contributions are as follows:

Windows 7Windows 8VistaXPwindows 95 etc.

Answer:

Steve jobs also made the Macintosh

Explanation:

Enumerations can contain ___________ values.

a.only unique

b.an indefinite number of

c.up to 10

d.up to 100

Answers

Answer: (A) Only unique

Explanation:

 Enumeration basically contain only unique value as enumeration is define as the set of the numeric values that is finite and it is represent specifically by the identifiers which is known as the enumeration constant.  

It only work with the finite values and also hide all the un-relevant and unnecessary information from the programmers. Enumeration is the type of the data type variable which contain only previous declared values.  

Create a program that will calculate the weekly average tax withholding for a customer, given the following weekly income guidelines: Income less than $500: tax rate 10% Incomes greater than/equal to $500 and less than $1500: tax rate 15% Incomes greater than/equal to $1500 and less than $2500: tax rate 20% Incomes greater than/equal to $2500: tax rate 30% Store the income brackets and rates in a dictionary. Write a statement that prompts the user for an income and then looks up the tax rate from the dictionary and prints the income, tax rate, and tax.

Answers

Answer:

#here is code in python

# create a dictionary of tax rate based on the income

tax = {499 : '10%', 1499 : '15%', 2499 : '20%', 2500 : '30%'}

#read the weekly income from user

week_income = int(input("Enter income: "))

#if weekly income is less than 500

if(week_income<500):

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[499])

   print("Tax on income is : ",week_income*0.1)

# if income is greater or equal 500 and less than 1500

elif(week_income<1500):

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[1499])

   print("Tax on income is : ",week_income*0.15)

# if income is greater or equal 1500 and less than 1500

elif(week_income<2500):

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[2499])

   print("Tax on income is : ",week_income*0.20)

# if income is greater 2500

else:

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[2500])

   print("Tax on income is : ",week_income*0.30)

Explanation:

Create a dictionary, in which tax are stored as per the weekly income.For income less than 500 tax will be 10%,for greater or equal 500 and less than 1500 tax will be 15%, for greater or equal 1500 and less than 2500 tax will be 20% and greater than 2500 tax will be 30% . Read the weekly income from user and then display the income, tax rate and tax on income according to the weekly Income.

Output:

Enter income :1200

Income is :  1200

Tax rate is :  15%

Tax on income is :  180.0

Do individuals have a privacy interest in their smartphones' locations?

Answers

Answer:

In today's world, everyone using smartphones as it easily allow to communicate by using different types of features like texting, video, e-mail and by using internet we can run various types of applications.

Smartphones carries one of the main and important skills that is show our current location. By using various types of applications like Global positioning system (GPS), cell ID and wifi we can easily trace the location.

But there is different types of option according to the individual requirement as some people want privacy as they are not interested to share their location to anyone.

Write a program that reads a string from the keyboard and tests whether it contains a valid date. Display the date and a message that indicates whether it is valid. If it is not valid, also display a message explaining why it is not valid. The input date will have the format mm/dd/yyyy. A valid month value mm must be from 1 to 12 (January is 1). The day value dd must be from 1 to a value that is appropriate for the given month. September, April, June, and November each have 30 days. February has 28 days except for leap years when it has 29. The remaining months all have 31 days each. A leap year is any year that is divisible by 4 but not divisible by 100 unless it is also divisible by 400.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

public class Main {

   // main method of the class

   public static void main(String[] args) throws Exception {

       // Scanner object to read date

       Scanner in = new Scanner(System.in);

       System.out.print("Enter a date in format mm/dd/yyyy to check:");

       // read the date from user

       String inp_date = in .next();

       // split the date with "/" delimeter

       String[] ip = inp_date.split("/");

       // find month from date

       int inp_month = Integer.parseInt(ip[0]);

       // find day from date

       int inp_day = Integer.parseInt(ip[1]);

       // find year from date

       int inp_year = Integer.parseInt(ip[2]);

       // boolean variable

       boolean flag = true;

       // print the input date

       System.out.println("Your Entered date was: " + inp_date);

       

       // check month is valid or not

       if (inp_month < 1 || inp_month > 12)

       {

           

           System.out.println("Entered Date is invalid:");

           System.out.println("The input month  is not from 1 - 12.");

           flag = false;

           

       }

       //check day is valid or not

       else if (inp_day < 1) {

           

           System.out.println("Entered Date is invalid:");

           System.out.println("The value of day is less than 1.");

           flag = false;

       }

       // check days in those month which has 30 days

       else if ((inp_month == 4 || inp_month == 6 || inp_month == 9 || inp_month == 11) && inp_day > 30) {

           

           System.out.println("Entered Date is invalid::");

           System.out.println("This month have only 30 days, but Entered day is greater than 30.");

           flag = false;

           

       }

       // if month is February then check leap year and days

       else if (inp_month == 2 && ((inp_year % 4 == 0) && (inp_year % 100 != 0))) {

           if (inp_day > 29) {

               

               System.out.println("Entered Date is invalid::");

               System.out.println("In a leap year, only 29 days in February.");

               flag = false;

           

           }

       }

       // if month is February and year is non-leap

       else if (inp_month == 2 && inp_day > 28) {

           

           System.out.println("Entered Date is invalid:");

           System.out.println("In a non-leap year, only 28 days in February.");

           flag = false;

       }

       // if all are valid

       if (flag)

           System.out.println("Entered Date is valid:");

   }

}

Explanation:

Read the date from user in mm/dd/yyyy format with the help of Scanner object. Extract day, month and year from the date. Then check whether month is between 1-12 or not and print appropriate message. After that check day is less than 1 or not, if not then print reason. Check the days in those month which has 30 days in it.If month is February then check for leap year and day is greater than 29 then print reason. Else if month is February and year is non-leap then check days whether it is greater than 28 or not. In last If value of flag is true then print date is valid.

Output:

Enter a date in format mm/dd/yyyy to check:2/30/2012                                                                          

Your Entered date was: 2/30/2012                                                                                              

Entered Date is invalid::                                                                                                    

In a leap year, only 29 days in February.

Using Karnaugh maps, simplify the following Boolean function:

F(a,b,c,d) = a' b' c' + b' c d' + a' b c d' + a b' c'

Answers

Answer:

F(a,b,c,d)=b'c' + a'cd' + ab'd'.

Explanation:

The image of the corresponding k-map is attached to this answer please refer it.By the sop given in the question the k-map is formed.There are 3 groups formed 1 group of four 1's and 2 groups of 2 1's.Hence there are three sop and the sop is reduced from the previous SOP.

.Statements using the ___________ class are explicit conversions.

a.Explicit

b.Convert

c.ExplicitConvert

d.ConvertType

Answers

Answer: Explicit

Explanation:

 The statement which used the explicit class are the explicit conversion, as  it is type of the conversion which uses the conversion keyword. These type of the keywords act as a function in the explicit conversion and compiler generating the code in the given inline function.  

Explicit conversion basically require the cast operator in its function when, the information is lost during explicit conversion.

Conversion of base class into the derives class is one of the typical example of the explicit conversion.

What Will Social Media Look Like in the Future?

Answers

Final answer:

Social media in the future is likely to continue evolving and impacting how we interact with the world. It may integrate virtual reality and augmented reality technologies, utilize advanced algorithms and AI, and prioritize privacy and security.

Explanation:

Social media in the future is likely to continue evolving and impacting how we interact with the world. It will likely become more integrated into our daily lives, affecting various aspects such as communication, entertainment, and information dissemination.

One possibility is the increased use of virtual reality (VR) and augmented reality (AR) technologies in social media. Users might be able to experience virtual environments and interact with others in a more immersive way. Social media platforms could also utilize advanced algorithms and artificial intelligence (AI) to provide more personalized content and recommendations based on user preferences and behavior.

Additionally, social media may see advancements in privacy and security features to address concerns over data protection and online safety. New regulations could be implemented to ensure the responsible use of social media and protect users from harmful or misleading content.

Which of the following statements about a stack is correct?

A stack pointer holds the address of the next free location in the stack at any given time.

A stack grows downward from high memory to low memory.

A stack is a set of memory locations reserved for storing information temporarily during the execution of programs.

All of the above

None of the above

Answers

Answer:

All of the above.

Explanation:

All the information provided in the question about stack is correct.

A stack pointer(SP) is a register to hold the address of the next free location that is present in the stack at any given time.

The growth of the stack is downwards it goes form high memory to low memory.The first address pushed be stored on the higher memory location in the stack and the next address will be stored at lower memory location.

A stack stored the temporarily for the duration of the execution of the program.

A 40 fps(frames per second) video clip at 5 megapixels per frame would generate large amount of pixels equivalent to a speed of ____________megabps(megabits per second).

4800
200
600

Answers

Answer:

[tex]4800\dfrac{megabytes}{second}[/tex]

Explanation:

We have the next two data:

[tex]40\,\dfrac{frames}{second}[/tex]

[tex]5\,\dfrac{megapixels}{frame}[/tex]

Now we can find the number of megapixels per second.

[tex]40\dfrac{frames}{second}\cdot 5\dfrac{megapixels}{frame}=200\dfrac{megapixels}{second}[/tex]

Finally considering an RGB video we will have 3 channels each one with 8 bytes then we will have 24 bytes per each pixel then:

. What year did the USA host World Cup? Right answer 1994

Answers

Answer:

USA host World Cup in 1994 1994 FIFA World Cup

Explanation:

USA host World Cup in 1994 FIFA World Cup

it was the 15th edition of FIFA World Cup

and Brazil was won the tournament

Brazil beat Italy by 3–2 in  penalty shoot-out

it was play between 17 June to 17 July and 24 team play this World Cup

and there matches played = 52

and 9 cities host this game

United States of America was chosen as the host by FIFA on the 4 July, 1988

what are "open source" programming language? Give examples of open source languages. Discuss the pros and cons of open source language.

Answers

Answer:

  The open source is the programming language that basically falls inside the parameters of the protocol of open-source convention. This fundamentally implies the language are not proprietary, with the specific arrangements (contingent upon the open source permit), can be adjusted and based upon in a way that is available to general society.

The python and ruby are the main examples of the open source programming language.

The disadvantage of the open source is that it is not much compatible as compared to all other software. It is not user friendly and easy for using the software.

The advantage of the open source programming is that it is available at low cost and it has high availability.

While there are a lot of programming languages out there, one of the most widely used when it comes to web applications and web oriented products is Javascript. It differs from other 'standard' program languages in many ways. Using the Internet and/or your book as a resource, describe some of the differences between JavaScript and other programming languages like C++, C#, and Java?

Answers

Explanation:

The main differences between Javascript and other programming languages are as following :-

Javascript is a scripting language so it doesn't need to be compiled to get executed while other programming languages like C++,Java etc need to be compiled.Javascript is typed dynamically while other languages are static typed.Browsers can execute Javascript code on the other hand they can't execute Java,C++ etc.
Other Questions
Determine the truth values of these statementsa) The product of x 2 and x 3 is x 6 .b) 2 + 5 = 7c) x 2 > 0 for any real number.d) The integer 315 8 is even.e) The sum of two odd integers is even.f) 2 Zg) 1 / Z +h) Q An item normally $15.99 is listed as being on sale for 30% off its original price, what must you pay?A discount store promises that all the items it sells are 40% of their normal asking retail price. If one buys shoes that normally retail for $60.99 what is the price you would expect to pay?Describe how you would answer each questionThen rewrite the percent off problem as a percent of problem. This may be confusing ...but basically.....Can someone try to give some ideas of what to write in the blanks....For a poem ! ( the topic is Nature) A certain working substance receives 100 Btu reversibly as heat at a temperature of 1000 from an energy source at 3600R. Referred to as receiver temperature of 80, calculate: A. the available energy of the working substance ( 63 Btu ) B. the available portion of the 100 Btu added at the source temperature ( 85 Btu ) C. the reduction in available energy between the source temperature and the 1000 temperature ( 22 Btu ) What is -6 + 5a - 6a - 10 - 4a simplified Glycolyis occurs ________________a. photosynthesisb. aerobic respiration onlyc. both aerobic and anaerobic respirationd. anaerobic respiration only A 60 kg box is pushed horizontally across the floor a distance of 20 meters. The force required is 15 N. In this effort, how many joules of work are done? Chapter 2.2 and 2.3 biology crossword Draw a four (4) carbon hydrocarbon (contains only Carbon and Hydrogen) with one carbon-carbon bond having a bond angle of 120. Read the original and improved research questions.Original: What is the relationship between natural resources and the Industrial Revolution?Improved: How did coal contribute to the Industrial Revolution in Pittsburgh in the 1880s?Which of the basic question words helped improve this research question? Select three options.howwhatwhenwherewhy (II) A 20.0-kg box rests on a table. (a) What is the weight of the box and the normal force acting on it? (b) A 10.0-kg box is placed on top of the 20.0-kg box, as shown in Fig. 443. Determine the normal force that the table exerts on the 20.0-kg box and the normal force that the 20.0-kg box exerts on the 10.0-kg box. Identify the written form of this number 4,812,000 Which of the following serves as reservoir hosts for all three of the pathogens that cause salmonellosis, influenza, and toxoplasmosis?a. catsb. reptilesc. birdsd. micee. cattle In the titration of 50.0 mL of HCl of unknown concentration, the phenolphthalein indicator present in the colorless solution turns pink when 26.5 mL of 0.130 M Ca(OH)2 is added. Show the calculation of the molarity of the HCI. Which of the following statements about reinforcement is true? a) Reinforcement is a type of natural selection. b) Reinforcement increases the number of intermediate phenotypes.c) Reinforcement is also called dispersive selection. d) Reinforcement decreases the morphological difference between two incipient species. what is the answer to -52 + 8|-1| + (-3) On the map , #2 is identifying which mountain system? Evaluate x + y + z for x = 2, y=-3, z=-4 Can anyone help me with this question please.(12points) YP=+8+10+12+...+ 106 and Q=2+4+6+8+ ... 104 are sums of arithmetic sequences, determine which is greater, Por Q, and by how much