"Your supervisor has asked you to modify the AMOUNT column in the ORDERS table. He wants the column to be configured to accept a default value of 250. The table contains data that you need to keep. Which statement should you issue to accomplish this task?"

Answers

Answer 1

Answer:

ALTER TABLE orders

MODIFY (amount DEFAULT 250)

Explanation:

ALTER TABLE statement is used to modify "amount" column in the existing "orders" table   MODIFY (amount DEFAULT 250) is used to set the default value 250 of the "amount" column.

Therefore if the supervisor wants the amount column to be configured to accept a default value of 250, then "ALTER TABLE orders MODIFY (amount DEFAULT 250) " statement should be issued.


Related Questions

46. The following program displays __________. public class Test { public static void main(String[] args) { String s = "Java"; StringBuilder buffer = new StringBuilder(s); change(buffer); System.out.println(buffer); } private static void change(StringBuilder buffer) { buffer.append(" and HTML"); } } a. Java b. Java and HTML c. and HTML d. nothing is displayed

Answers

Answer:

The answer to the given question is the option "B".

Explanation:

The description of the given java program can be given as:

In the given program firstly we define a class that is "Test". In this class we define the main method in this method we define a string variable that is "s" and assign value to a variable that is "Java". Then we create a StringBuilder class object that is "buffer" and in object creation time we pass variable s as a parameter. Then we call the change function and print the function value that is "Java and HTML" In the change function, we pass the object of StringBuilder as a parameter. In this function, we use the append function in this function we pass value that is "and HTML". It is inbuilt function used to represent string value.

That's why the output to this program is the option "B".

Which of the following is most likely to be considered plagiarism? Using materials from a source without proper citation. Adding extra data points without proper justification. Tampering with research equipment. Intentionally reporting the results of inaccurate statistical tests

Answers

Answer:

Using materials from a source without proper citation is considered as plagiarism

Explanation:

Plagiarism is the publication of another author's thoughts, ideas, or expressions without their consent or authorization and phrasing them as if it is an original work. It is a dishonest and non-ethical act.

Final answer:

Using materials from a source without proper citation is the most likely act to be considered plagiarism. It involves presenting another's ideas, words, or intellectual property as your own without appropriate credit.

Explanation:

Out of the options presented, the action most likely to be considered plagiarism is using materials from a source without proper citation. Plagiarism involves the act of presenting another's ideas, words, or intellectual property as your own without providing due credit. This can involve strategies like copying and pasting text from a source and not citing it, paraphrasing someone else's work without acknowledgment, or representing another's visual or auditory work as your own. It's important when writing or conducting research to make sure all sources used are properly cited to avoid plagiarism.

Learn more about Plagiarism here:

https://brainly.com/question/27007189

Mary’s company has asked her to research new computers. The company wants to provide workers with minimal computers that have an operating system and a browser that will allow the workers to connect to a server. The server will do most of the necessary processing.What kind of computer should Mary recommend?

Answers

Answer:

peer to peer kind of computer usually PCs

Explanation:

since the computers needed is a minimal computer that has a n operating system and browser and not necessary a server, the best kind of computer is a peer to peer kind of computer which allows the sharing of files with a centralized server which does all the processing of the files shared to it by various PCs connected via the peer to peer format.

Most PCs have an operating system, a browser that connects it to a server while browsing and also allows the useage of peer to peer networks. every company requires computer that can be used in the peer to peer network because it helps the easy and faster sharing of files between workers.

Which statement is true of integrating an expert system into the database component of a decision support system (DSS)? a. It reduces access speed. b. It adds the capability to handle fuzzy data. c. It increases the time and cost of calculating data for models. d. It adds inductive reasoning to traditional database management system functions.

Answers

Answer: option d is correct

Explanation:

It improves quality and efficiency of computer systems. They can have part to whole relations, extrapolations, or predictions.

Answer:

B. It adds the capability to handle fuzzy data.

Explanation: Expert system is a knowledge based application which is integrated into (DSS) decision support system of a computer to add human capabilities in handling queries such as fuzzy data.

It increases the access speed helping to solve queries as quick as possible by reducing the time required to solve or respond to queries.

It helps to add human capabilities to system operations hereby giving responses through deductive knowledge.

You’re using Disk Manager to view primary and extended partitions on a suspect’s drive. The program reports the extended partition’s total size as larger than the sum of the sizes of logical partitions in this extended partition. What might you infer from this information?
a. The disk is corrupted.
b. There’s a hidden partition.
c. Nothing; this is what you’d expect to see.
d. The drive is formatted incorrectly

Answers

Answer:

b. There’s a hidden partition.

Explanation:

The hidden partition is a separate section set aside on OEM computer hard drives, often alluded to as the recovery partition and restore partition.

This portion of memory is used by the manufacturer to preserve the data used to restore your computer to its default settings.

This function is particularly useful as it does not involve the CD or DVD of the operating system.

Final answer:

If the extended partition's size is larger than the sum of its logical partitions reported by Disk Manager, it may indicate the presence of a hidden partition on the drive.

Explanation:

If you are using Disk Manager to view primary and extended partitions on a suspect's drive and you observe that the extended partition's total size is reported as larger than the sum of the sizes of logical partitions within it, you might infer that there's a hidden partition. This observation suggests that some disk space within the extended partition is not accounted for by the visible logical partitions, potentially implying that there may be a partition or space that is not immediately apparent within the file system's structure. It is not uncommon for individuals with technical knowledge to hide partitions which can be used to store data one does not wish to be easily accessible.

A system in which human and mechanical components operate together to perform a task is known as ____________. Total Operating Systems Man-Machine Systems Person-Machine Systems Complete Operating Systems (COS)

Answers

Answer:

Man Machine Systems

Explanation:

The system in which a human and machine integrate together to complete the task assigned is called man machine system. In this system task of man and machine clearly defined. It has specific inputs and outputs which are balanced.

Answer:

Man machine system

Explanation:

Man-Machine System is a system consisting of a human operator or group of operators and a machine, by means of which the operator performs a task involving, for example, the production of material goods, the management of some type of operation, or the processing of information.

Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website using the host name, which fails. You then try to ping a known public IP address, which succeeds. What is most likely the problem?
a. IP Address of each machine is set incorrectly.b. DNS settings are incorrect.c. Subnet mask is wrong.d. No gateway address is set.

Answers

Answer:

b. DNS settings are incorrect

Explanation:

DNS (Domain Name System) settings help to translate web addresses to their IP addresses. Domain Name System servers help to establish a link between human-readable address (host name) and computer readable address (IP address) trough its network.

If the ping to a IP address works but ping to a host name does not, it means that the system interpreting host names to IP addresses doesn't work properly.

When BranchCache is being utilized in an office and a client computer makes a subsequent request for a file, what will indicate to the client where the file can be retrieved from the cache in the branch office?

Answers

Answer: Information content

Explanation:

UESTION 2 Choose the most appropriate data structure with which to represent the following: the items on a person's driver's license. A. array B. record C. array of records D. hierarchical record E. either b or d above

Answers

The data structure with which to represent the following: the items on a person's driver's license is hierarchical record

D. hierarchical record

Explanation:

A driving license of person will hold details of his name, address, date of birth, date of issue and date of renewal and validity period, images and documents etc.

Suppose to capture the following additional details, renewal of licenses, traffic fine and modified of license such light vehicle to heavy vehicles etc. Where records are stored as multiple entries

Traffic find and payments, accident details and insurance details, passport information. to keep all this records hierarchical record methods is required.

Keeping all the as single records is not advisable. Person of license data to captured or enter should be categorized

Given an array of ints named x and an int variable named total that has already been declared, write some code that places the sum of all the elements of the array x into total. Declare any variables that you need.

Answers

Final answer:

To get the sum of all the elements in an array and store it in a variable, you can use a loop to iterate through each element and add it to the total.

Explanation:

To place the sum of all the elements of the array x into the variable total, you can use a loop to iterate through each element of the array and add it to the total. Here is an example code:

int[] x = {1, 2, 3, 4, 5};
int total = 0;

for (int i = 0; i < x.length; i++) {
 total += x[i];
}

In this example, the variable total is initialized to 0. The loop iterates through each element of the array x, adding the value of each element to the total. Finally, the total variable will contain the sum of all the elements in the array.

A user has accessed your company's Web server with her Web browser. Which choice lists the necessary elements for client-server communication to occur in this scenario?

Answers

Answer:

The answer to the given question is "A CGI script, a Web form, and a Web server with a CGI interpreter".

Explanation:

In computer science, Any code that runs on the webserver is using CGI script. The term CGI script stands for common gateway interface script that transmitting information from and to the client and server.

That's why the answer to this question is "A CGI script, a Web form, and a Web server with a CGI interpreter".

Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next?

a.nat (inside,outside) dynamic NET1
b.nat (outside,inside) dynamic interface
c.nat (inside,outside) dynamic interface
d.nat (outside,inside) dynamic NET1

Answers

nat (inside,outside) dynamic NET1 should be used next to a workstations to access the Internet.

a.nat (inside,outside) dynamic NET1

Explanation:

Multiple networks are connected through cisco ASA device assigns the security levels and differentiate over the different network. Mostly security level are well defined and trustworthiness on the interface.

Trustworthiness is measured from 0 to 100, 0 is considered as untrusted level of security and 100 is considered as high level (trusted level) of security.

To connect internet interface level is configured as low level security it is marked as 0 levels and internal security should be marked as higher level and marked 100. Since interface is connected through DMZ and security level should assigned in-between.

testout You want to prevent users in your domain from running a common game on their machines. This application does not have a d signature. You want to prevent the game from running even if the executable file is moved or renamed. signature. You want to prevent the game from running even if the executable file is moved or renamed. You decide to create an AppLocker rule to protect your computer. You decide to create an AppLocker rule to protect your computer. Which type of condition should you use in creating this rule? Which type of condition should you use in creating this rule?

Answers

Answer:

Hash condition is the correct answer to the following question.

Explanation:

Hash condition provided more security than the applocker file path rule and it is manually for the files.

It is more secure than the path rule because each file has its separated hash condition. Drawback of hash file is every time whenever when file is updated then we have to update the file hash condition.

Fred has just added DSL service at his home, with a separate DSL modem and consumer-grade router with four Ethernet ports. Fred wants to use the same old phone he was using before the installation of DSL. Which is most likely true about the phone cabling and phone used with his new DSL installation?
a. He uses the old phone, cabled to one of the router/switch device’s Ethernet ports.b. He uses the old phone, cabled to the DSL modem’s ports.c. He uses the old phone, cabled to an existing telephone port, and not to any new device.d. The old phone must be replaced with a digital phone.

Answers

Answer:

The answer is letter C.

Explanation:

He uses the old phone, cabled to an existing telephone port, and not to any new device.

Final answer:

Fred can continue using his old telephone by connecting it to an existing telephone port, utilizing a splitter that separates voice calls from DSL data, without the need to connect it to his router or modem, or to replace it with a new digital phone.

Explanation:

Fred wants to know how he can continue using his old phone with his new DSL service. The most accurate option is that he uses the old phone, cabled to an existing telephone port, and not to any new device. This is because DSL service uses the existing telephone line infrastructure for internet connectivity but allows for the simultaneous use of the phone line for standard voice calls.

The DSL modem is connected to the phone line with a splitter that separates the frequencies used for DSL service from those used for voice calls, so the old phone can still be used as before. Fred doesn't need to connect his phone to one of the router's Ethernet ports or the DSL modem's ports, nor does he need to replace the old phone with a digital phone as long as it was working with the telephone line prior to the DSL installation.

A bakery collects data on sales. Each sales record includes the date of the sale and some metadata about the items that were part of the sale. The data includes: the names of the items sold, the types of items sold, the number of each item sold, and the price of each item sold. Which of the following CANNOT be determined from the bakery's data set?A. The total income from sales the bakery received in the past month. B. Which customer most frequently purchases bread. C. The item bought in the highest quantity in the past week. D. Days when certain items sell the most.

Answers

Answer:

B. Which customer most frequently purchases bread.

Explanation:

As per the scenario, the data we are receiving from the sales record of the bakery is :

The date on which the items are sold

Each items name which are sold

The number of each item sold and

The price of each item sold  

These data are required to estimate how much the company has earned the profit during a given period of time.

So from the above scenario, there is no data given about the customer i.e customer name, customer number, etc. So there is no chance to track the details of a customer purchase history.

Therefore, the most appropriate answer is option B

Mike installed a new external DVD drive. The installation program required a reboot. As the system rebooted, Mike got a Blue Screen of Death (BSOD) error before Windows fully rebooted. He shut off the system and disconnected the external DVD drive. What should he try next?

Answers

Answer:

LKGC (Last Known Good Configuration)

Explanation:

Last Known Good Configuration will have saved all the critical data & information from the last time when Mike successfully rebooted his system. So if Mike accesses it he will get the system in same state as it was before he installed hard drive.

Hugo has created an HTML document to which he has attached an external CSS style sheet containing styles that define all HTML elements in the document. Hugo wants to apply styles to his home page only that will override the style definitions of the attached style sheet. How can he accomplish this?a. Apply inline styles to each affected element.b.Embed an internal style sheet.c. Attach to the HTML document another HTML document containing the desired styles.d. Disassociate the HTML document from the external CSS style sheet.

Answers

Answer:

The answer is option b.

Explanation:

In the question, it is defined that Hugo created an HTML document that uses an external CSS style sheet. Now he wants to apply a new style on his home page. for that, he will be Add a sheet in internal design to his document. and other options are not correct that can be defined as:

In option a, if we apply inline style sheet for each effect that will take a long time. In option c if we attach HTML document so he faces difficulty in finding attributes because in document two attributes maybe do the same work. In option d if we Separated the external style sheet with HTML document so, all the styles will disappear on the HTML page.  

Which of the following is true of the Internet as a medium for branding? a) The Internet is more effective as a media for branding because it has a one-directional communication flow. b) Unlike the radio, the Internet is not an effective medium for branding for large companies. c) Unlike print media, the Internet is not an effective tool for branding. d) The Internet is an effective medium for achieving communications objectives such as consideration and/or evaluation. e) Unlike using television as media, the Internet does not enable service branding.

Answers

Answer:

The answer to this question is option "d".

Explanation:

Internet branding describes as a brand management system that allows us to use the Internet as a tool for promoting the products. In other words, we can say that advertising the product on the Internet is known as Digital marketing. and other options are not correct that can be defined as:

In option a, It does not provide one-directional communication flow. The b, c, and e options are not correct, because the internet is an effective medium for branding and it also provides services for branding.  

With ____, the computer uses each record’s primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

Answers

Answer:

direct organization

Explanation:

Based on the description that is provided within the question it can be said that the term being described is called a direct organization. Like mentioned in the question this term refers to data that is stored in direct-access devices and can be easily and quickly retrieved if you know the address identifying where the record is physically stored in the database file.

One of the disadvantages of cable technology is that:
a. It is more expensive than other signal carrying systems
b. While it works well for television signals, it is ineffective for data transmissions required by the internet
c. Systems used by many providers require customers to share bandwidth with neighbors
d. It is incompatible with most modern communication systems
e. The speed of the connection rises in conjunction with the distance between the end customers from the central hub

Answers

Answer:

The answer is letter C

Explanation:

Systems used by many providers require customers to share bandwidth with neighbors

What feature, new to Windows Server 2012, provides the ability to find identical sets of data on a SAN-based storage array and reduces duplicate sets down to a single instance in order to reduce space?

Answers

Answer:

Data De-duplication

Explanation:

Data De-duplication is a feature that can help reduce the impact of redundant data on storage costs.

When enabled, Data De-duplication optimizes free space on a volume by examining the data on the volume by looking for duplicated portions on the volume. Duplicated portions of the volume's data set are stored once and are (optionally) compressed for additional savings.

Data De-duplication optimizes redundancies without compromising data fidelity or integrity.

When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second?
[Check all that apply]

a. Check the C:\User\Belinda Lim\Documents folder.
b. Check the C:\Users\Belinda Lim\Documents folder.
c. Use the chkdsk command.
d. Use the sfc command.

Answers

Answer:

The answer is "option b and c".

Explanation:

We know that all the program or task that is performed in the computer is stored in the computer memory that is available in the internal part that is C disk.To check this user profile we first open the Command Prompt then we write that command "C:\Users\Belinda Lim\Documents folder" that checks the folder and to resolve this problem we use "chkdsk command".The full form of chkdsk command is "check disk".This command checks a particular disc and, when necessary, repairs or recovers data on the disk. This command also points as "bad" any broken or defective areas on the disk and retrieves any information that is still unharmed.

Define the following Window class: - integer data members, width and height - a constructor that accepts two integer parameters (width followed by height) and uses them to initialize the data members - a friend function, areSameSize, that accepts two Window objects and returns a boolean indicating if they are the same size. Two windows are the same size if the widths and heights match.

Answers

Answer:

The code to this question can be given as:

Code:

class Window // define class window.

{

private:

int width, height; //define global variable

public:

Window(int w,int h) //define parameterized constructor.

{

width = w; //holds parameter value.

height = h; //holds parameter value.

}

friend bool areSameSize(Window a, Window b) //define friend function.

{

if ((a.height == b.height) && (a.width == b.width)) //conditional statement.

{

return true; //return value true.

}

else //else block

{

return false; //return value false.

}

}

};

Explanation:

In the above code we define a class that is "Window". In this class we define private variable that is "width and height". In this class, we define a parameterized constructor and pass two integer variable that is "w and h". The w variable stands for width and h variable is stands for height. In this constructor, we use a global variable that holds constructor parameter value.In this class, we define friend function. This function is used to provide accessibility to private data members and member function outside the class. The return type of this function is bool because it will give true or false value. In this function, we use the conditional statement. In the if block we check a.height value is equal to b.height and a.width value is b.width. if it is true it will return true else it will return false.

Which line in the following program will cause a compiler error? 1 #include 2 using namespace std; 3 int main() 4 { 5 int number = 5; 6 if (number >= 0 && <= 100) 7 cout << "passed.\n"; 8 else 9 cout << "failed.\n"; 10 return 0; 11 }

Answers

Answer:

Line 1

Explanation:

Line one is not complete. It should have been #include <iostream> This line tells the compiler to use the input and output header file for this program, the iostream header file contains the functions necessary for output statements used in 7 and 8

Final answer:

The compiler error occurs on line 6 due to a missing variable 'number' in the second part of the conditional expression inside the if statement.

Explanation:

The line in the program that will cause a compiler error is line 6. The conditional expression within the if statement is incomplete. Instead, it should be if (number >= 0 && number <= 100), where number is compared to 0 and 100. Without repeating the variable number for the second comparison, the compiler doesn't know what to compare 100 with, leading to an error.

In C++, each condition within a logical expression needs to be fully specified, including the variable that is being compared. In addition, C++ commands or statements must end with a semicolon, and the use of preprocessor directives like #include is for inserting the contents of files, such as , which is necessary for using cout.

A return value of 0 typically indicates successful termination of the program to the operating system, and the using namespace std statement makes it so that we can use elements of the std namespace without the prefix std::.

Given an initialized String variable message, and given a PrintWriter reference variable named output that references a PrintWriter object, write a statement that writes the string referenced by message to the file in to which output streams.

Answers

Answer:

The output streams to this question is "output.print(message)".

Explanation:

The description of the following can be given as:

In the given question it is define a string datatype variable that is "message". Then we create a reference variable of PrintWriter class that is "output" and call string type variable that is message by the use of the print function we print message.  

Final answer:

To write a string to a file using PrintWriter in Java, use either the println method which appends a newline or the write method with a manual newline. The example code demonstrates both approaches.

Explanation:

To write the string referenced by the variable message to the file using a PrintWriter object referenced by the variable output, you would use the following statement in Java:

output.println(message);

This statement uses the println method to output the string along with an automatically appended newline character which signifies the end of a line. If you were to use the write method instead, you would need to manually add the newline character, like so:

output.write(message + "\n");

In either case, it is essential to manage the ends of lines when writing to a file to ensure the file's content is formatted correctly.

how can you create fades with the smart tool? How can you specify the types of fade curves that are used with the smart tool?

Answers

Answer:

The correct answer to the following question is:

To create fades you can click and then drag the end of the clip with a smart tool.

Fade Dialog Box is the fade curve.  

Explanation:

Smart Tool is an application which also provide their users with the features of the quick access menu by which they can easily access their programs or the software.

By using smart tool the user also creates a crossfade.

This is defined as a station movement from a BSS in one ESS to a BSS within another ESS. This case is supported only in the sense that the station can move. Maintenance of upper-layer connections supported by 802.11 cannot be guaranteed. In fact, disruption of service is likely to occur. Select one:
a. no transition.
b. BSS transition
c. ISS transition
d. ESS transition

Answers

Answer:

d.

Explanation:

With my experience in the field of information technology, it seems that the term being defined is ESS transition. This is basically (like mentioned in the question) a station movement from a BSS in one ESS to a BSS in another ESS. An ESS is an extended service set which describes one or various different interconnected basic service sets (BSS) as well as the LAN's that they are associated with.

Write the definitions for three function named max. Each receives two parameters, of the same type, and returns the larger of the two values. Define one of these functions to apply to type double, another to type int and a third to type char.

Answers

Answer:

The method definition to this question can be given as:

Method definition:

double max(double x, double y)  //define method with double parameter  

{

if (x>=y)    //check condition.

return x;  //return value

else

return y;     //return value

}

double max(int x, int y)    //define method with integer parameter

{

if (x>=y)    //check condition

return x;    //return value

else

return y;  //return value

}

double max(char x, char y)   //define method with char parameter

{

if (x>=y)    //check condition

return x;    //return value

else

return y;    //return value

}

Explanation:

The above method definition can be described as below:

In the first method definition first, we define a method that is "max()". In this method we pass two variables as a parameter that is "x and y" and the datatype of this is double. Then we use a conditional statement. In the if block we check if variable x is greater then equal to y then it will return x else it will return y.   In the second method definition, we define a method that is same as the first method name but in this method, we pass two integer variable that is "x and y". Then we use a conditional statement. In the if block we check if variable x is greater then equal to y then it will return x else it will return y. In the third method definition, we define a method that is same as the first and second method name but in this method, we pass two char variable that is "x and y". Then we use a conditional statement. In the if block we check if variable x is greater then equal to y then it will return x else it will return y.

​ In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.

Answers

Answer:

design walk-through

Explanation:

In addition to analyzing logic and program code, a project team usually holds a session with users, called a design walk-through, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.

A design walk-through is a quality practice that allows designers to obtain an early validation of design decisions related to the development and treatment of content, design of the graphical user interface, and the elements of product functionality.

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user"s machine. The program enabled outsiders to infiltrate the user"s machine. What type of malware is this an example of?

a. Trojan horse
b. virus
c. worm
d. spyware

Answers

Answer:

Trojan Horse

Explanation:

Trojan horse software is the most commonly software used by hackers. This software is used to enable access of the hackers over any computer that is under attack.

Answer:

The answer is the Trojan Horse

Explanation:An explanation it needs not.

Other Questions
1. Mexico is geographically located in the __________. 2. Today there are people of Mexican descent in the ________. 3. The languages spoken in Mexico are _________ and ________.4. The Empire dominated Mexico from the fourteenth to the _________ centuries. 5. Frida Kahlo, the artist's wife, is known for her __________. A normal distribution is observed from the times to complete an obstacle course. The mean is 69 seconds and the standard deviation is 6 seconds. Using the Empirical Rule, what is the probability that a randomly selected finishing time is greater than 87 seconds? Divergent boundaries are not one, smooth ridge of separation. Instead, they are broken into a series of segments, with different segments of fault offset from others. What features allow for the offset of divergent boundaries? . The 6 fourth-grade classes atWest Elementary donated a total of$1,792 to restore a wildlife habitat.Write and solve an equation thatshows one way to estimate the amountdonated by each class. PLEASE HELP ASAPA circle is centered at the point (-3, 2) and passes through the point (1,5). The radius of the circle is (blank) units. The point (-7 (blank) lies on this circle An individual accidentally transected (cut across) the spinal cord between T1 and L1. This would result in ________. An individual accidentally transected (cut across) the spinal cord between T1 and L1. This would result in ________. paraplegia quadriplegia spinal shock only hemiplegia Solve: 919 2Round to the nearest whole 5) The Sacramento region used great power in the decade of the 1850s, in spite of its small resident population, when compared to San Francisco. The largest portion of the state's population lived in the "Sacramento District." Sacramento representatives strongly influenced the State's Constitutional Convention, landed the permanent State Capitol, and elected the State's first governor. Sacramentos influence was in large part due to its growth in commerce, particularly that portion related to transportation such as railroads and steamboats, as well as wholesale merchants who supplied retailers throughout California and Nevada. Those large-scale merchants of Sacramento saw their success tied to better wagon roads and railroads. In this sentence from paragraph five, which phrase is the LEAST effective replacement for the phrase "used great power"? A) applied great power B) exerted great power C) employed great power D) squandered great power 6) Excerpt from Wuthering Heights Emily Bronte I would have made a few comments, and requested a short history of the place from the surly owner; but his attitude at the door appeared to demand my speedy entrance, or complete departure, and I had no desire to aggravate his impatience previous to inspecting the penetralium. What does the term penetralium mean as used in this sentence from the passage? A) inside B) openness C) outside D) privacy 7) Excerpt from The Meaning of July Fourth for the Negro Fredrick Douglass To him, your celebration is a sham; your boasted liberty, an unholy license; your national greatness, swelling vanity; your sounds of rejoicing are empty and heartless; your denunciation of tyrants brass fronted impudence; your shout of liberty and equality, hollow mockery; your prayers and hymns, your sermons and thanks-givings, with all your religious parade and solemnity, are to him, mere bombast, fraud, deception, impiety, and hypocrisy -- a thin veil to cover up crimes which would disgrace a nation of savages. Which is the BEST definition of the word sham as it it used in the above sentence from the passage? A) an honorary award B) a memorial service C) a fraud or mockery D) a historical event Ecologists will often represent the amount of potential food available for each trophic level in an ecosystem with a(n) OU EDOTBrutus is trying to decide between three local colleges. He needs some advice about if he is mWhich person at his school would be best suited to help him?Brentele person this school would be best suitedOschool psychologistguidance counselorinstructional designerlibrary technician One way to make it easier to track your progress toward success isA. improve your product.B. to keep adapting to the changing business environment.c. offer stock to the public.D. to set very specific short- and long-term goals. Solve the inequality for u.-18>-38-5uSimplify your answer as much as possible. To make low-profit customers more profitable the ABC bike shop- A) sends birthday greetings to its best customers and gives them discounts on merchandise. B) has a club for its regular customers, organizing cycling events and parties for them. C) allows existing customers to upgrade to a newer model by trading in their older model. D) though it previously offered free delivery, now charges for deliveries made outside the city. E) encourages customers to send in their suggestions for product improvement. x + 3x -4=0solve by factoring The gravitational force between two objects increases but the distance between them remains the same PLEASE HELP WILL GIVE BRAINLIEST!!The Roman church was definitely founded by Priscilla and Aquila.True orFalse? Mi hermano no _____ nadar. Connie and her father are shopping for groceries. Connie's father asks her to go and get the toothpaste and the milk. Connie takes off muttering to herself "toothpaste and milk...toothpaste and milk". According to the stores model, which memory system is Connie using?A) long-term storeB) sensory storeC) short-term storeD) network store Forty workers fell from iron smelter staging area when the main supports collapsed. All of them suffered broken bones, five were severely burned, and 11 employees died. This is the twentieth job-related accident reported in the 2000-employee plant during the last 6 months. What OSHA penalties can the organization expect?a. Top executives may be criminally charged.b. The firm will probably pay $70,000 in fines.c. The firm will probably pay $10,000 in fines.d. The firm will probably be required to install a workplace safety program and to fund research in that area.e. OSHA will probably not assess a penalty. How did the Catholic Church respond to the Protestant Reformation? (5 points)The pope had all Protestant reformers arrested and executed.The pope called for a meeting of all church leaders.Church leaders ignored complaints from reformers.Church leaders agreed to incorporate all the ideas of the Protestant reformers.