suppose within your web browser you click on a link to obtain a web page. the ip address for the associated url is not cached in your local host, so a dns lookup is necessary to obtain the ip address. suppose that n dns servers are visited before your host receives the ip address from dns; the successive visits incur an rtt of rtt1, ..., rttn. further suppose that the web

Answers

Answer 1

When a web browser clicks on a link to obtain a web page and the IP address is not cached locally, the browser initiates a DNS (Domain Name System) lookup. The DNS lookup involves querying DNS servers to obtain the IP address associated with the URL.

What happens when a web browser clicks on a link to obtain a web page?

The paragraph describes a scenario where a web browser clicks on a link to access a web page. Since the IP address for the corresponding URL is not cached locally, a DNS lookup is required to obtain the IP address.

In this scenario, the DNS lookup involves visiting multiple DNS servers, denoted as n, before the host receives the IP address.

Each visit to a DNS server incurs a round-trip time (RTT) denoted as rtt1, rtt2, ..., rttn.

The explanation sets the context for understanding the potential delays and network interactions involved in resolving the IP address through DNS before accessing the desired web page.

Learn more about web browser

brainly.com/question/31200188

#SPJ11


Related Questions

which of the following is NOT a shortcoming of emails
A instant delivery
b information overload
c computer viruses
d ineffectiveness to communicate emotion ​

Answers

Answer:

A. instant delivery

Explanation:

MARIE includes 4096 bytes of memory. If Marie memory is divided in four memory banks, how much is each memory bank? O 2K Bytes O 1K Bytes 4K Bytes Question 31 (X+Y)Z+W+ 1 results in 1 as the output. O True O False

Answers

Marie includes 4096 bytes of memory. If Marie memory is divided into four memory banks, The amount of memory in each memory bank is determined by dividing the total amount of memory by the number of memory banks.

As a result, each memory bank of 4096 bytes memory will have a size of 4096/4 = 1024 bytes.So, the answer to your question is 1K Bytes.Each memory bank will have a capacity of 1K Bytes.Note: (X + Y) Z + W + 1 results in 1 as the output has a False output. The given equation can be written as:XZ + YZ + W + 1 = 1XZ + YZ + W = 0The expression on the left-hand side of the equation cannot be equal to zero. So, the output is false.

Based on the given content, MARIE includes 4096 bytes of memory. If this memory is divided into four memory banks, each memory bank would have 4096 divided by 4, which is equal to 1024 bytes or 1K byte.

As for the second part, it seems to be a multiple-choice question with the expression (X+Y)Z+W+1 resulting in 1 as the output. Without further context or values assigned to the variables, it is not possible to determine whether the statement is true or false.

To know more about memory banks visit:

https://brainly.com/question/31567696

#SPJ11

what is the purpose of an index? group of answer choices increasing the speed of queries increasing the speed of update operations

Answers

An index is a type of data structure that accelerates database update and query operations. In general, the main function of an index is to give a way to rapidly discover specific records in a table without having to browse through the entire table. There are various types of indexes that can be used for different purposes.

Here are several specific methods via which indexes might boost a database's performance:

Speeding up queries: Instead of having to scan the entire table, an index enables the database to quickly find the rows that meet a certain search criterion. By doing this, queries that require to retrieve enormous volumes of data can operate much more quickly.

Enhancing update performance: Update operations, such as inserting, deleting, or updating records, can be made faster by using an index. Instead of having to search through the entire table, the database may rapidly find the records that need to be updated by utilizing an index.

To know more about Index kindly visit
https://brainly.com/question/14297987

#SPJ4

What tool would you use to reduce the digital image size.

Answers

TinyJPG or TinyPNG This site allows you to reduce the file size of your images. There are no editing features; instead, TinyJPG/TinyPNG focuses on compressing files to ultimately reduce the file size, stripping unnecessary data from your image.

using a secure logon and authentication process is one of the six steps used to prevent malware.

Answers

While using a secure logon and authentication process can be an important security measure, it is just one step in preventing malware. The six steps commonly recommended for preventing malware are:

Educate users: Train users on safe browsing habits, how to identify suspicious emails and websites, and the importance of not clicking on links or downloading attachments from unknown sources.

Use anti-virus/anti-malware software: Ensure that all devices have anti-virus and anti-malware software installed and kept up to date.

Keep software up to date: Regularly update all software, including operating systems, web browsers, and plugins to patch any vulnerabilities that could be exploited by malware.

Use a firewall: Implement firewalls on all devices and networks to monitor and block unauthorized access to the system.

Secure logon and authentication process: Use strong passwords and two-factor authentication to protect user accounts from unauthorized access.

Regularly back up data: Regularly back up important data to protect against data loss due to malware infections, hardware failures, or other disasters.

Learn more about malware here:

https://brainly.com/question/14276107

#SPJ11

two different numbers and find the sum, p and difference of the numbers. Draw a flowchart to find the greater number among two input Draw a flowchart to print the odd numbers from 1 to 21 and sum. Write an algorithm and draw the flowchart to print the odd numbers from 1 to 99 and also find their sum. ​

Answers

This prompt requires 4 different algorithms. See the algorithms given below.

What is an algorithm?

An algorithm is a step-by-step technique that outlines a series of instructions that must be followed in a precise order in order to generate the intended outcome.

To find the sum, p, and difference of two different numbers, you can use the following algorithm:

Input two numbers a and b

Set sum = a + b

Set p = a * b

Set difference = a - b

Output sum, p, and difference

The Flow chart is as follows;

start

   -> input a

   -> input b

   -> sum = a + b

   -> p = a * b

   -> difference = a - b

   -> output sum, p, and difference

end

2. To find the greater number among two inputs, you can use the following algorithm:

Input two numbers a and b

If a is greater than b

   Set greaterNumber = a

Else

   Set greaterNumber = b

Output greaterNumber

The flow chart is as follows:

Input two numbers a and b

|

V

Is a greater than b?

|

V

No--------Yes

|          |

V          V

Set greaterNumber = b     Set greaterNumber = a

|

V

Output greaterNumber


3. To print the odd numbers from 1 to 21 and find their sum, you can use the following algorithm:

Set sum = 0

For i = 1 to 21

   If i is odd

       Print i

       Set sum = sum + i

Output sum


Here is the flowchart for the above:

Start

Set sum = 0

For i = 1 to 21

   If i is odd

       

       Print i

       Set sum = sum + i

   End If

End For

Output sum

End


4. To print the odd numbers from 1 to 99 and find their sum, you can use the following algorithm:

Set sum = 0

For i = 1 to 99

   If i is odd

       Print i

       Set sum = sum + i

Output sum

┌───────────┐

│ Set sum = 0│

└──────┬────┘

      │

      ▼

┌───────────┐

│  Set i = 1│

└──────┬────┘

      │

      ▼

┌───────────┐

│ if i is odd│

│ Print i   │

│ Set sum = │

│ sum + i   │

└──────┬────┘

      │

      ▼

┌───────────┐

│   Set i = │

│ i + 1     │

└──────┬────┘

      │

      ▼

┌───────────┐

│if i <= 99 │

└──────┬────┘

      │

      ▼

┌───────────┐

│ Output sum│

└───────────┘

Learn more about algorithms:
https://brainly.com/question/28724722
#SPJ1

Question 1
Which of the following would Java recognize as a String?
"%.*
i 8a
"4bout T!me"
O "word"
Question 2

Answers

Answer:

The answer is "4bout T!me" and "word"

Explanation:

In the given java program code, the two choices that are "4bout T!me" and "word" were correct, because it uses the double quote, and its example can be defined as follows:

Example:

public class Exa //defining class Exa

{

public static void main(String[] args) //defining main method

{

    String x ="4bout T!me";//defining String variable x and assign value

       String y ="word";//defining String variable y and assign value

 System.out.println(x+"  "+y);//print message

}

}

Output:

4bout T!me  word

what is a form of data cleaning and transformation? building vlookup or xlookup functions to bring in data from other worksheets building pivot tables, crosstabs, charts, or graphs deleting columns or adding calculations to an excel spreadsheet

Answers

Data cleaning and transformation involve a combination of Techniques such as building VLOOKUP or XLOOKUP functions, creating pivot tables, crosstabs, charts, or graphs, and deleting columns or adding calculations to an Excel spreadsheet.

A form of data cleaning and transformation involves utilizing various Excel functions and features to organize, analyze, and present data more effectively.

This process can include building VLOOKUP or XLOOKUP functions to retrieve and consolidate data from multiple worksheets, making it easier to access and analyze relevant information.

Another useful method for data transformation is constructing pivot tables, crosstabs, charts, or graphs, which help in summarizing and visualizing data trends, patterns, and relationships.

These tools enable users to examine and manipulate large datasets quickly, making it easier to draw meaningful conclusions and make data-driven decisions.

Additionally, data cleaning can involve deleting unnecessary columns or adding calculations to an Excel spreadsheet. This step helps in streamlining data by removing irrelevant or redundant information and introducing new, meaningful insights through mathematical operations and formulas.

In summary, data cleaning and transformation involve a combination of techniques such as building VLOOKUP or XLOOKUP functions, creating pivot tables, crosstabs, charts, or graphs, and deleting columns or adding calculations to an Excel spreadsheet. These methods enable users to efficiently organize, analyze, and present data, ultimately leading to better decision-making and improved outcomes.

To Learn More About Data cleaning

https://brainly.com/question/30379834

#SPJ11

Your hometown probably has little to offer in terms of photography because you've already seen it. True False

Answers

False it the answer bro

Answer:

Your answer would be (B) False

Explanation:

I hope this helps

What is that tool that makes liquid metal? Ik I might sound dumb but I'm rlly curious
(the thing on the right)​

What is that tool that makes liquid metal? Ik I might sound dumb but I'm rlly curious(the thing on the

Answers

Answer:

it’s called a solder. It’s used to permanently fuse two metals together. And they’re used in many different areas like construction, technology, etc.

That pic that you have i think is a computer chip or something similar.

So a solder is the tool that is used to make metal into liquid.

hope this helps and pls mark me brainliest :)

a soho office is using a public cloud provider to host their website. the it technician is choosing an approach to protect transaction data between the website and visitors from the internet. which type of encryption key management method should the technician choose?

Answers

When it comes to protecting transaction data between a website and visitors from the internet, an IT technician in a SOHO (Small Office/Home Office) environment should consider implementing  a hybrid encryption key management method.

In a hybrid encryption key management method, a combination of symmetric and asymmetric encryption is employed.

Symmetric encryption uses a single encryption key for both encryption and decryption processes, while asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.

The technician should generate a symmetric encryption key specifically for encrypting the transaction data.

This key would be used to encrypt and decrypt the sensitive information exchanged between the website and its visitors.

However, securely exchanging this symmetric key can be a challenge.

To address this challenge, the technician can employ asymmetric encryption.

The website's server would generate a public-private key pair, with the public key being shared with the visitors.

When a visitor accesses the website, their browser can use the public key to encrypt the symmetric encryption key. The encrypted symmetric key can then be securely transmitted to the server.

Upon receiving the encrypted symmetric key, the server can utilize its private key to decrypt it.

This allows the server to retrieve the symmetric encryption key and use it to encrypt and decrypt the transaction data.

Asymmetric encryption ensures that even if the encrypted symmetric key is intercepted during transmission, it remains secure as only the server possesses the private key necessary for decryption.

By employing a hybrid encryption key management method, the IT technician can ensure the protection of transaction data between the website and visitors.

It combines the efficiency of symmetric encryption for encrypting the actual data and the security of asymmetric encryption for securely exchanging the encryption key.

For more questions on hybrid encryption

https://brainly.com/question/29579033

#SPJ8

the sort() function can be used with numerous stl containers, but the container elements should be any c data type that supports the use of . group of answer choices the right shift operator (>>) the less than operator (<) the greater than operator (>) the left shift operator (<<)

Answers

The sort() function is a powerful tool provided by the C++ STL library that allows you to sort elements within a container.

This function can be used with a variety of STL containers, including vectors, arrays, and lists. However, there is an important caveat to consider when using the sort() function with containers - the container elements must be of a C++ data type that supports the use of certain operators.Specifically, the container elements should support the use of the less than operator (<) or the greater than operator (>). These operators are used by the sort() function to compare elements within the container and determine their order. Additionally, the elements should be of a data type that supports the use of the right shift operator (>>) or the left shift operator (<<). These operators are used to extract or insert data from or into the container.
Therefore, if you want to use the sort() function with a specific STL container, it is important to ensure that the container elements meet these requirements. Otherwise, the sort() function may not be able to properly sort the elements within the container.In summary, when using the sort() function with STL containers, it is important to ensure that the container elements are of a C++ data type that supports the use of the less than or greater than operator, as well as the right shift or left shift operator.

To learn more about elements :

https://brainly.com/question/29794315

#SPJ11

list any two advantages of data sorting​

Answers

Answer:

1 ) it helps arrange all records in a table.

2 ) it is able to deal well with a huge list of items.

Explanation:

there is no additional storage is required .

Text,Audio and graphic is entered into the computer using
a)A cpu
b)Output
C)Input
ICT Question​ asap pls help

Answers

Answer:

I think it's input, not sure tho

Why did Stephen Hawking stop playing hide and seek?

Answers

Answer:

because she keeps using a metal detector.

HURRY

I ONLY HAVE 4 DAYS LEFT

Select the correct answer.

A game design company develops a game in which players run a grocery store and need to keep tabs on the dollar amount of goods sold and received each day. Which statement best describes this game?

A.
It is an educational game that teaches economics.
B.
It is an educational game that teaches algebra.
C.
It is an educational game about health sciences.
D.
It is an inventory-management game.
E.
It is an educational game that teaches accounting.

Answers

E. It is an educational game that teaches accounting

You have decided to edit your photos using the RAW file. What are some benefits of working with the RAW format? Select all that apply.

RAW files are processed, making it easier to edit
The images are already optimized
More color options when editing
More control over adjusting the White Balance

Answers

Since you have decided to edit your photos using the RAW file, the  benefits of working with the RAW format is option d: More control over adjusting the White Balance.

What are the benefits of using RAW?

One of the biggest advantages of RAW is the ability to restore shadows and highlights during post-processing without adding the granular noise typically associated with high ISO settings. If you have significantly overexposed or underexposed, RAWs are fairly forgiving.

Therefore, it has Better detail and dynamic range as you can capture more detail and a wider dynamic range from your camera sensor because to RAW's vastly increased image information.

Learn more about RAW format from

https://brainly.com/question/27977505
#SPJ1

brainly needs captcha before answering questions right?​

Answers

No, atleast I haven’t seen it

find the id, first name, and last name of each customer that currently has an invoice on file for wild bird food (25 lb)

Answers

To provide the ID, first name, and last name of each customer who currently has an invoice on file for wild bird food (25 lb), the specific data from the database or system needs to be accessed. Without access to the specific data source, it is not possible to provide the direct answer.

To find the required information, you would typically need to query a database or system that stores customer and invoice data. The query would involve joining tables related to customers and invoices, filtering for invoices with the specified product (wild bird food, 25 lb). The specific database schema and structure would determine the tables and fields involved in the query.

Here's an example SQL query that demonstrates the concept, assuming a simplified database schema:

```sql

SELECT c.id, c.first_name, c.last_name

FROM customers c

JOIN invoices i ON c.id = i.customer_id

JOIN invoice_items ii ON i.id = ii.invoice_id

JOIN products p ON ii.product_id = p.id

WHERE p.name = 'wild bird food' AND p.weight = 25;

```

In this example, the query joins the `customers`, `invoices`, `invoice_items`, and `products` tables, filtering for the specified product name ('wild bird food') and weight (25 lb). The result would include the ID, first name, and last name of each customer who has an invoice on file for that particular product.

Please note that the actual query may vary depending on the specific database schema and structure, and the query language being used.

Without access to the specific data and database structure, it is not possible to provide the direct answer to the query. However, the explanation and example query provided should give you an understanding of the process involved in retrieving the required information from a database or system.

To  know more about database , visit;

https://brainly.com/question/28033296

#SPJ11

16. What's the difference between a footnote and endnote?
A. Footnotes are typically at the bottom of the page, while endnotes are at the bottom of the
document.
B. Footnotes are typically within the document, while endnotes are at the bottom of the
page.
O C. There's no difference; footnotes and endnotes are the same thing.
O D. Endnotes are typically at the bottom of the page, while footnotes are at the end of the
document.

Answers

Answer:

I believe it is 'A'

Explanation:

Footnotes appear at the bottom of the relevant page. Endnotes appear in a list at the end of the text, just before the bibliography.

The one difference between footnotes and endnotes is that footnotes appear at the bottom of the same page, while endnotes appear at the end of the paper.

What is footnote?

A footnotes is known to be a short sentence or words that are often written in the bottom of a given or same page.

Note that the endnotes only shows at the end of the paper and as such The one difference between footnotes and endnotes is that footnotes appear at the bottom of the same page, while endnotes appear at the end of the paper.

Learn more about footnote from

https://brainly.com/question/1481437

#SPJ2

Who has gotten a random file link from someone? What file does it contain?

Answers

Answer:

those are bots , just report those

Explanation:

I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it

In your own words, explain what it means to “buy low, sell high.”

Answers

Answer:

Resell value should be high like buying a used car for a low price fixing it a bit and double your money.

Explanation:

Answer:

Exactly what it says

Explanation:

You buy items at a low price then sell them at a higher price to ensure you get a profit

write a c program to convert the change given in quarters, dimes, nickels, and pennies into dollars and cents.sr2jr

Answers

This is a relatively simple program to write in C. Here's a template you can use:

#include <stdio.h>
int main(){
   // Declare variables for quarters, dimes, nickels, and pennies
   int quarters, dimes, nickels, pennies;
   // Calculate the number of dollars and cents
   int dollars = (quarters * 25 + dimes * 10 + nickels * 5 + pennies) / 100;
   int cents = (quarters * 25 + dimes * 10 + nickels * 5 + pennies) % 100;
   // Print the result
   printf("%d dollars and %d cents\n", dollars, cents);
   return 0;
}

The program starts with including the standard input-output library. Then, the main function is defined in the program. The variables quarters, dimes, nickels, pennies, total_cents, and dollars are declared in the program.Next, the user is prompted to enter the number of quarters, dimes, nickels, and pennies. Then, the total amount in cents is calculated and stored in the variable total_cents.The value of total_cents is divided by 100 to get the value in dollars. Finally, the value of dollars is displayed on the console with two decimal places.

For such more questions on  c  program:

brainly.com/question/15683939

#SPJ11

How would I add a play again feature to this RPS program in python using a while loop?

import random

choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")

computer = random.randint(1, 3)

if computer == 1:

print("Computer played R.")

elif computer == 2:

print("Computer played P.")

else:

print("Computer played S.")

#Winning conditions

if computer == 1 and choice == "R":

print("Computer played Rock.")

print("Tie")

elif computer == 2 and choice == "P":

print("Computer played Paper.")

print("Tie")

elif computer == 3 and choice == "S":

print("Computer played Scissors.")

print("Tie")

elif computer == 1 and choice == "S":

print("Computer played Rock.")

print("You Lose")

elif computer == 2 and choice == "R":

print("Computer played Paper.")

print("You Lose")

elif computer == 3 and choice == "P":

print("Computer played Scissors.")

print("You Lose")

elif computer == 1 and choice == "P":

print("Computer played Rock.")

print("You Win")

elif computer == 2 and choice == "S":

print("Computer played Paper.")

print("You Win")

elif computer == 3 and choice == "R":

print("Computer played Scissor.")

print("You Win")

Answers

Answer:

import random

playAgain = True;

while playAgain == True:

   choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")

   computer = random.randint(1, 3)

   if computer == 1:

    print("Computer played R.")

   elif computer == 2:

    print("Computer played P.")

   else:

    print("Computer played S.")

#Winning conditions

   if computer == 1 and choice == "R":

    print("Computer played Rock.")

    print("Tie")

   elif computer == 2 and choice == "P":

    print("Computer played Paper.")

    print("Tie")

   elif computer == 3 and choice == "S":

    print("Computer played Scissors.")

    print("Tie")

   elif computer == 1 and choice == "S":

    print("Computer played Rock.")

    print("You Lose")

   elif computer == 2 and choice == "R":

    print("Computer played Paper.")

    print("You Lose")

   elif computer == 3 and choice == "P":

    print("Computer played Scissors.")

    print("You Lose")

   elif computer == 1 and choice == "P":

    print("Computer played Rock.")

    print("You Win")

   elif computer == 2 and choice == "S":

    print("Computer played Paper.")

    print("You Win")

   elif computer == 3 and choice == "R":

    print("Computer played Scissor.")

    print("You Win")

   choice = input("Play Again?")

   if(choice == "n"):

     playAgain = False

   else:

     playAgain = True

Explanation:

Use a boolen variable and a while loop. The while loop will keep looping until it is false. In this case, I have it set up to keep looping unless the user enters n.

Tip: Make sure that all of the code is indented with the while loop.

how many bits would be needed to count all the students in class today

Answers

Answer:

5 bits

Explanation:

Most classes have around 20 student with a 5-bit system goes up to 31 ( 1+2+4+8+16) and a 4-bit system(1+2+4+8) goes up to 15. Bits are the 1s and 0s and so a 5-bit system looks like this: 01001(18).

Cross peoples father chops just disappear with the advent of manufacturing today some manufacturing jobs are disappearing in favor of digital solutions what parallel can you draw between these two phenomena guns

Answers

Both the disappearance of manual labor jobs in manufacturing and the decline in the use of hand-chopped firewood can be seen as consequences of technological advancements and increased automation.

What is Automation?

Automation refers to the use of technology to perform tasks that would otherwise require human intervention. This can be achieved through the use of machines, software, or algorithms that are designed to perform specific tasks without the need for direct human involvement.

Automation has been widely adopted in industries such as manufacturing, transportation, and finance, as it allows for greater efficiency, speed, and cost savings. However, it can also result in job loss and the need for workers to acquire new skills to adapt to changing job markets.

To learn more about Automation, visit: https://brainly.com/question/28530316

#SPJ1

what key word shows that a method will not return a value? group of answer choices instantiate void null parameter variable

Answers

Void functions shows that a method will not return a value, group of answer choices instantiate void null parameter variable.

Except that they do not return a value when the function executes, void functions are constructed and used just like value-returning functions. The term "void" is used by void functions in place of a data type. A void function executes a task before returning control to the caller; nevertheless, it does not return a value. The return statement has no return value, thus you can use it or not. Control will automatically return to the caller at the conclusion of the function even without the return statement. A good way to use a void function is to print a header and footer to a file or screen.
Keep in mind that the C++ language supports both void functions and value-returning functions as subprogram types.

To know about void kindly visit

https://brainly.com/question/24160353

#SPJ4

gateways depict branching of sequence flows but do not depict merging of those flows. group startstrue or falsetrue, unselectedfalse, unselected

Answers

The correct answer is Gateways display decision-driven process branching and merging. Diamonds are used to represent basic gateways. On the diagram, gateways typically show up as pairs.

An essential resting place for data travelling to or from other networks is a gateway, which is a node (router) in a computer network. We can converse and send data back and forth because of gateways. Without gateways, the Internet wouldn't be of any use to us (as well as a lot of other hardware and software). Network gateways are responsible for connecting networks by carrying out protocol and data format translation at the network boundary. Businesses may use gateways to join various internal networks, such as IT and OT networks, or to connect the corporate LAN to the public Internet. Whereas a router connects networks using the same protocol, a gateway acts as a single access point and protocol converter. A computer that is situated in the middle of several networks or programmes. The gateway transforms data, communications, and information from one protocol or format to another. Some of the duties of a gateway may be carried out by a router.

To learn more about Gateways click on the link below:

brainly.com/question/30167838

#SPJ4

Select the correct navigational path to sort data using multiple levels. click the tab on the ribbon, and look in the gallery. select the rows or columns you wish to sort. select . add a level, and another, with the parameters needed, and click ok.

Answers

To sort data using multiple levels, follow these steps:Click on the tab on the ribbon that corresponds to the application you are using (e.g. Microsoft Excel).

Look for the "Sort & Filter" option in the gallery of options available on the ribbon.Select the rows or columns you wish to sort by clicking on them.Click on the "Sort & Filter" option and select "Custom Sort" from the drop-down menu.In the "Sort" dialog box, add a level by clicking on the "Add Level" button.Select the appropriate parameters for the first level of sorting (e.g. sort by "Last Name" in alphabetical order).Repeat step 5 and step 6 to add additional levels of sorting as needed.Click "OK" to apply the sorting to the selected rows or columns.By following these steps, you can sort data using multiple levels in a way that meets your specific needs and requirements.

To learn more about sort click on the link below:

brainly.com/question/29839923

#SPJ4

Answer:

1. Data. 2. Sort & Filter. 3. Sort.

What task do the referential integrity settings prevent?
a) editing a non-key field in a destination table
b) sharing data from one field between two tables
c) linking a primary key to another table’s primary key
d) deleting a record that has related records in another table

Answers

Answer:

D

Explanation:

Other Questions
the evaporator in a commercial installation normally consists of a(n) tube coil through which the building air is circulated by a motor-driven fan. For members of what the diffusion of innovation theory calls the early majority, the recommended strategy for promoting a new technology is to _____. the density of water is 1000 kg/m cube.what does it mean Emily is encouraged to read more than 4 hours each week. It takes her 45 minutes to finish her first book. She divides the remainder of the time equally amongst the other six days. What is the minimum number of minutes she should read each day? Write and solve an inequality. put this is an inequality pls!! On January 1, a company purchased equipment that cost $10,000. The company has not yet recorded depreciation, which is estimated at $1,800 per year. The company will prepare financial statements at the end of January. Complete the necessary adjusting entry by selecting the account names and dollar amounts from the drop-down menus. Describe the economy of East St. Louis around the time of 1917. To what major city wasit compared? The mass of a sesame seed is 0.0046 g. The mass of a pollen grain is 0.000000000513 g. About howmany times greater is the mass of a sesame seed than the mass of a pollen grain?a) 1x 107b) 1 x 106c) 4 x 10-3d) 5 x 10-10Pls help!!! I will do anything!!! I am being timed Question 11 points)Will any two objects dropped from the same height hit the ground at the same time if air resistance is not afactor?A) scientificB) non-scientific select the accurate statements concerning membrane fluidity.-The degree of membrane fluidity varies depending on the composition of the membrane. -Phospholipids are relatively free to move around laterally within the membrane. -Unanchored proteins are relatively free to move around laterally within the membrane. Most metals are not good conductors of heat.TrueorFalse How can the triangles be proven similar by the sas similarity theorem? show that the ratios startfraction x y over v u endfraction and startfraction y z over v w endfraction are equivalent, and u x. show that the ratios startfraction u v over x y endfraction and startfraction w v over z y endfraction are equivalent, and v y. show that the ratios startfraction u w over z x endfraction and startfraction x y over w v endfraction are equivalent, and w x. show that the ratios startfraction x z over w u endfraction and startfraction z y over w v endfraction are equivalent, and u z. if cathepsins b and l (found in the host cell) are rendered non-functional by mutation or therapeutic intervention, what would be the outcome relative to the ebola virus life cycle? Write an equation of the line that passes through (1, 1) and (3, 3). Auditors should obtain and evaluate sufficient appropriate evidence to support significant accounting estimates. Differences between the estimates best supported by the evidence and those in the financial statementsA. Are per se unreasonable and should be treated as material misstatements.B. May be individually reasonable but collectively indicate possible bias.C. May be individually unreasonable, but if they collectively indicate no bias, accumulation of the differences with other identified misstatements is not required.D. Should arouse concern only when estimates are based on hypothetical assumptions or subjective factors. what exactly are achilles and agamemnon fighting about? what is the value system that lies behind their fight? what is management ? I WILL GIVE BRAINLIEST!!!!!!!Adam earns $180 each week. He saves 15% of his earnings. How muchmoney does Adam save each week? am i correct??plz help HELP ME, IT'S AN EMERGENCY Consider the market for a given piece of hardware aphotocopier of brand x, for example that needs after-saleservicing. Suppose that there is free entry into this after market.Servicing photocopiers implies a fixed cost of F and a marginal cost of where x is the number of units serviced. Total demand for servicing is given by D = S(a p), where p is price and S the number of photocopier owners. Finally, suppose that firms in the after market compete a` la Cournot.A. Find the equilibrium number of firms in the after-market.B. Find the consumer surplus in the aftermarket.C. Relate this result to the discussion on indirect network externalities.