snowflake is cloud agnostic, especially when it comes to loading files from stage into snowflake accounts. if truly agnostic, which of the below options should be true? select 3. a snowflake account on aws can only have stage objects that point to, and load files from aws s3 buckets. a snowflake account on aws can have stage objects that point to, and load files from aws, azure and/or gcp. a snowflake account on azure can only have stage objects that point to, and load files from azure blob storage. a snowflake account on azure can have stage objects that point to, and load files from aws, azure and/or gcp. a snowflake account on gcp can only have stage objects that point to, and load files from gcp buckets. a snowflake account on gcp can have stage objects that point to, and load files from aws, azure and/or gcp.

Answers

Answer 1

If Snowflake is truly cloud agnostic, the following statements should be true:

What are the true statements?

A Snowflake account on AWS can have stage objects that point to and load files from AWS, Azure, and/or GCP.

A Snowflake account on Azure can have stage objects that point to and load files from AWS, Azure, and/or GCP.

A Snowflake account on GCP can have stage objects that point to and load files from AWS, Azure, and/or GCP.

This means that Snowflake is not limited to loading data from one specific cloud provider and can seamlessly integrate with multiple cloud providers, allowing users to choose the provider that works best for their specific use case.

Read more about cloud agnostic here:

https://brainly.com/question/30470077

#SPJ1


Related Questions

PLEASE HELP AND HURRY!!!

Which command group on the Format tab of the SmartArt Tools contextual tab allows a user to change the fill and outline of SmartArt shapes?

Shapes
Shape Styles
Arrange
Size

Answers

Answer:

Shape Styles

Hope this helps :)

Mark me brainiest

Explanation:

You can use the diagnostic utility called _______________ in Windows to trace the progress of an ICMP packet between your system and a remote computer.

Answers

In Windows, the diagnostic utility called "tracert" can be used to trace the progress of an ICMP packet between your system and a remote computer.

The "tracert" command, short for "trace route," is a built-in Windows utility that helps diagnose network connectivity issues by tracing the path taken by an Internet Control Message Protocol (ICMP) packet from your computer to a specified destination. To use "tracert," open the Command Prompt and type "tracert" followed by the IP address or domain name of the remote computer you want to trace. The utility sends a series of ICMP Echo Request messages to the destination with gradually increasing Time-to-Live (TTL) values.

As each packet reaches a network device (router), the device decrements the TTL value and returns an ICMP Time Exceeded message back to your computer. This process continues until the destination is reached or until the maximum number of hops (by default, 30) is reached. The output of the "tracert" command shows the IP addresses and round-trip times of each network device along the route, allowing you to identify where connectivity issues may be occurring.

Learn more about tracert here:

https://brainly.com/question/32228465

#SPJ11

Drive
0101
0102
0103
0104
0105
0106
0107
0108
0109
0110
0111
0112
0113
0114
0115
0166
Sorting Minute
True
102
162
165
91
103
127
112
137
102
147
163
109
91
107
93
100
An Excel table can help
you organize your data in
preparation for using it
with charts and other
analysis tools.
Copyright © 2003-2022 International Academy of Science. All Rights Reserved.
False

Answers

Answer:

What

Explanation:

True

Which of the following best describes a variable?

A. A named area in computer memory that holds value
B. A Python statement that has random effects
C. A place where you store a value that can never change
D. None of these

Answers

Answer:

A. A named area in computer memory that holds value

Explanation:

A variable is a way of assigning an area in a computer memory that can hold values like text, number and characters. When using variables, you must specify its type. Specifying its type determines the type of data the variable can hold, how it is handled and its location in the computer memory.

Variables hold information that is stored in the computer memory and is labeled by a name.

The statement among the options that best describes a variable is;

A: A named area in computer memory that holds value

Variables

The correct answer to this question is option A. This is because a variable is a method that we use to assign an area in a computer memory that is capable of holding inputs such as text, number and other characters.

Now, it is pertinent to note that you must specify the type of variable used. This is done to determine the type of data that the variable can hold, and where it is located in the computer memory.

In conclusion, the information that Variables hold in the computer memory are usually labeled by a name.

Read more about variables at; https://brainly.com/question/16397886


Why is John Von Neumann to a remarkable name?
si​

Answers

Answer:

John von Neumann is remarkable for his vast knowledge of mathematics, and the sciences as well as his ability to correlate the pure and applied sciences.

Explanation:

John von Neumann who was born on December 28 1903, and died on February 8,1957 was known for his extensive knowledge of mathematics, physics, computer, economics, and statistics. In computing, he was known to conceive the idea of the self-replicating machines that thrive in the automata cellular environment, the von Neumann architecture, stochastic computing and linear programming.

He developed the game theory in Economics, and laid the foundation for several mathematical theories. He contributed greatly to quantum mechanics and quantum physics. Little wonder, he was dubbed "the last representative of the great mathematicians."

How to command "if else" in Phyton?

Answers

Answer: if():     elif ():       else:

Explanation:

I don't know if "if else" you meant elif(): --- so I just put all three down (elif is optional if you meant if(): and else: though)

Select the correct answer from each drop-down menu.
Read the passage. What Internet threat is Tanya facing? What should she do about it?
While surfing on an unknown site. Tanya received a notification that her PDF reader needed some updates. She clicked the link. It opened a suspicious-looking website. Tanya immediately closed the window. Now when she tries to access the Internet, the window is covered with pop-up ads. As a result, she can no longer use the Internet or access websites. Tanya is facing an) A. Spam B. computer virus C. Phasing link. threat. She should D. Delete the original email E. Check her bank account to see if her money's safe F. run a good anti-virus program​

Answers

Answer:

she facing a computer virus and should run a good anti virus program

Answer:

B computer virus

F run an antivirus program

Explanation:

A stack is an appropriate data structure to use when you want to process items in the opposite order in which they are received. A common application is to use stacks to track back operations or manage undo operations in a programming or text editor. True/False

Answers

In conclusion, the statement "A stack is an appropriate data structure to use when you want to process items in the opposite order in which they are received" is true.

"A stack is an appropriate data structure to use when you want to process items in the opposite order in which they are received" is a True statement.

A stack is a linear data structure that operates in a last-in, first-out (LIFO) manner, where items are added and removed from the top of the stack. Stacks are widely used in software programming to store and organize information. It is one of the most important data structures in computer science.A stack is an appropriate data structure to use when you want to process items in the opposite order in which they are received. The application of stacks is very wide and is used in a variety of fields. In computing, stacks are used to manage function calls, store local variables, manage CPU registers, and perform other tasks. In text editors, stacks are used to manage the undo operation. The user's edits are pushed onto a stack, and when the user requests an undo, the stack is popped and the most recent edit is undone.

To know more about  data structure visit:

https://brainly.com/question/31164927

#SJP11

Switch on your light make sure it is shining onto the wall hold your largest plastic shopping bag square between the light and the wall

Answers

Explanation:

As light travels through matter, different amounts of that light penetrate through the matter. Transparent objects allow nearly all the light shined on it to pass through the object. Glass, air, and clear plastic are transparent objects.

The best time to vet a location is:


Question 1 options:


during post-production.



during production.



at the same time of day as the filming.



first thing in the morning.


Question 2 (2 points)

Which of these is most useful on a windy day?


Question 2 options:


boom



microphone windshield



tripod



extra camera


Question 3 (2 points)

Which of these statements is accurate?


Question 3 options:


No one on a set is responsible for someone else's safety.



Directors have an ethical obligation to protect everyone on the set.



Safety issues are best addressed in post-production.



Filming indoors eliminates safety issues.


Question 4 (2 points)

If equipment will be stored longer than a week:


Question 4 options:


remove the lens caps.



find a professional storage facility.



remove the batteries.



use cases designed especially for long-term storage.


Question 5 (2 points)

An equipment check:


Question 5 options:


is essential during production.



should only be done in pre-production.



should only be done in post-production.



should be done during pre- and post-production.

Answers

Answer:

1. at the same time of day as the filming.

2. microphone windshield.

3. Directors have an ethical obligation to protect everyone on the set.

4. remove the batteries.

5. should be done during pre- and post-production.

Explanation:

I just took the test

Which of the following shows the assignment of a string to a variable? Select 3 options.

answer = input("How old are you? ")

answer = "23"

answer = '23'

answer = 23

answer = (23)

Answers

Answer:

23, (23)

Explanation:

Answer:

⬇️

Explanation:

answer = "23"

answer = input("How old are you? ")

answer = '23'

correct on edg. 2021

more Or less?

Pick one and be rewarded!!!!!!!

Answers

Answer:

More

Explanation:

hope this is helpful

Consider the following code segment. int x = 0; x ; x = 1; x = x 1; x -= -1; system.out.println(x); what is printed when the code segment has been executed?

Answers

The output that is printed when the code segment has been executed is 4.

What is a code segment?

A code segment also referred to as a text segment or just text in computing, is a section of an object file or the equivalent piece of the program's virtual address space that holds executable instructions.

How does a code segment work?

When a program is saved in an object file, the code section is included.

When the loader loads a program into memory for execution, multiple memory regions (specifically, pages) are allocated, matching to both segments in the object files and segments only needed at run time.

Learn more about Code Segment:

https://brainly.com/question/25781514

#SPJ1

Full Question:

Consider the following code segment.

int x = 0;x++;x += 1;x = x + 1;x -= -1;

System.out.

println(x);

What is printed when the code segment has been executed?

The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the ____ of a Web browser.

Answers

Answer: Bookmark File

Explanation: Cache is like short term memory, like history on a web browser. You can manually clear it, just like on the web. If you bookmark a file though, it gets saved to memory, and you can call on it later

What are the tag attributes? give example

Answers

Tag attributes change the style or function of a tag.

One example is the style attribute. It allows you to change things such as the color, size, and font of a text.

A paragraph without any attributes would look like this:

<p>

Your text here...

</p>

A paragraph with attributes might look like this:

<p style="color:blue;font-size:60px;">

Your text here...

</p>


4. What are the things that a computer literate understands?name them

Answers

\({\blue{OII}}\)

\({\green{TUDO}}\) \({\red{BEM ?}}\)

The activities that the computer scientist develops Data structuring, development and design. CG. Numerical analysis and development of algorithms. Database management. CG.

\({\red{TCHAU }}\)

❤❤

With ok g hey Ed F egg to TK up TK A

In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

Answers

Answer:

The right response is "Robots ".

Explanation:

A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.

Artificial intelligence is a far more superior or complicated aspect of intelligence. They make use of patterns to find solutions to various problems.

Artificial intelligence machines are called robots. These tend to work and perform tasks that are much complex and length within short and simple steps. They can be sued to free the workers and help in any hazardous situation or events. Hence they serve the purpose of bots or robots.

Learn more about the context of applications of artificial intelligence (AI).

brainly.com/question/24259157.

how to move the clustered bar chart to a chart sheet in excel

Answers

The five steps to move a clustered bar chart to a chart sheet in excel are listed below.

Select the clustered bar chart that you want to move.Right-click on the chart, and from the context menu, choose "Move Chart".In the Move Chart dialog box, select the "New sheet" option.Enter a name for the new chart sheet in the "New sheet" field if desired.Click the "OK" button.How to move the clustered bar chart to a chart sheet in excel?

To move a clustered bar chart to a chart sheet in Excel, you can follow these steps:

Select the clustered bar chart that you want to move.Right-click on the chart, and from the context menu, choose "Move Chart".In the Move Chart dialog box, select the "New sheet" option.Enter a name for the new chart sheet in the "New sheet" field if desired.Click the "OK" button.

Excel will create a new chart sheet and move the clustered bar chart to that sheet.

Them you can navigate to the chart sheet by clicking on its tab at the bottom of the Excel window.

Learn more about excel at:

https://brainly.com/question/29280920

#SPJ1

The types of ____ systems used with personal and business computers today include smart cards.

Answers

Answer:

Storage.

Explanation:

I ran into this question before

Answer:

Storage

Explanation:

I've seen this question in a quiz before.

1. Adding a node to an empty chain is the same as adding a node to the beginning of a chain.

Answers

In a linked list, a chain of nodes is used to represent a sequence of elements. Each node in the chain contains a reference to the next node in the chain, forming a "link" between the nodes.

When a new node is added to an empty chain, there is no existing chain to connect to. Therefore, the new node becomes the first and only node in the chain. This is the same as adding a node to the beginning of a chain, since there are no other nodes that come before it.

To add a node to an empty chain, the new node is simply assigned as the head of the chain, with its next reference set to null to indicate that it is the last node in the chain. For example:

sql

Node newNode = new Node(data); // create a new node with some data

head = newNode;                // set the new node as the head of the chain

newNode.next = null;           // set the next reference to null

After this code is executed, the head variable points to the new node, which is the first and only node in the chain.

In contrast, when a new node is added to a non-empty chain, the new node must be inserted between two existing nodes.

This involves updating the next reference of the previous node to point to the new node, and the next reference of the new node to point to the next node in the chain.

Learn more about link here:

https://brainly.com/question/12950142

#SPJ11

How do you predict technology will continue to change the marketing and promotions industry?

Answers

Answer:

The in person marketing industry won't completely die down, but now with the pandemic hitting forcing a lot of people to do deals, sell, and promote things online. Advertising is only going to grow online as time goes on, and marketing will follow close behind.

Explanation:

What are practical things people can do to protect their privacy and security online? What can we do, and what can we avoid doing?

Please help this is due today and I really need help.

Answers

there are multiple ways people can protect there privacy like you don’t even have to get online just block yourself away from the world or you can make sure that your always connected to a vpn with hides you from being online or you can avoid putting in your real information if it’s not needed

Write the Java code for the main method in a class called TestElection to do the following: a) Declare an array to store objects of the class defined by the UML above. Use a method from the JOptionPane class to request the length of the array from the user.
Election - candidate : String - num Votes: int <>+ Election <>+ Election (nm : String, nVotes: int) + setCandidate( nm : String) + setNumVotes(): int + toString(): String

Answers

The `electionsArray` and print the details of each `Election` object using the `toString()` method, which is automatically called when we pass the `Election` object to `System.out.println()`.

Here's the Java code for the main method in a class called `TestElection`, incorporating the mentioned functionality:

```java

import javax.swing.JOptionPane;

public class TestElection {

   public static void main(String[] args) {

       // Request length of the array from the user

       String lengthInput = JOptionPane.showInputDialog("Enter the length of the array:");

       int arrayLength = Integer.parseInt(lengthInput);

       // Declare an array to store objects of the Election class

       Election[] electionsArray = new Election[arrayLength];

       // Populate the array with Election objects

       for (int i = 0; i < arrayLength; i++) {

           String candidate = JOptionPane.showInputDialog("Enter the candidate for Election #" + (i + 1) + ":");

           String votesInput = JOptionPane.showInputDialog("Enter the number of votes for Election #" + (i + 1) + ":");

           int numVotes = Integer.parseInt(votesInput);

           electionsArray[i] = new Election(candidate, numVotes);

       }

       // Print the array elements using the toString() method

       for (Election election : electionsArray) {

           System.out.println(election.toString());

       }

   }

}

```

In this code, we start by importing the `JOptionPane` class from the `javax.swing` package to make use of its methods for input and output dialog boxes.

Inside the `main` method, we utilize the `JOptionPane` class to request the length of the array from the user. The input is captured as a string and parsed into an integer using `Integer.parseInt()`.

Next, we declare an array named `electionsArray` of type `Election[]` to store objects of the `Election` class.

We then use a `for` loop to populate the array with `Election` objects. For each iteration, we prompt the user to enter the candidate name and the number of votes for a specific election. The input values are parsed accordingly, and a new `Election` object is created and assigned to the respective index of the array.

Finally, we iterate over the `electionsArray` and print the details of each `Election` object using the `toString()` method, which is automatically called when we pass the `Election` object to `System.out.println()`.

This code allows you to interactively collect information about multiple elections from the user and store them in an array of `Election` objects for further processing or display.

Learn more about Election here

https://brainly.com/question/31998007

#SPJ11

To prevent and remove malware infections you should manually install and run anti-malware software, keep software and OSes up to date with current patches, and be careful when downloading files, programs, attachments, and such.
True
False

Answers

True, because this will help to prevent a virus in your device. By preventing that you will have to install and anti malware to help with those preventions. I hope this helps let me know if you have any questions :)

Cloud storage refers to the storage of data on ______.

Answers

Answer:

server

Explanation:

The storage of the data on the server of the web app is known as cloud storage.

The information regarding cloud storage is as follows:

It is the model of cloud computing in which the data is stored on the internet via the cloud computing provider that managed and operates the data storage.Also, it removes the purchasing & managing of the data storage infrastructure.

Therefore we can conclude that the storage of the data on the server of the web app is known as cloud storage.

Learn more about the data here: brainly.com/question/10980404

Please answer these questions! Will mark Brainliest!!

Please answer these questions! Will mark Brainliest!!

Answers

Answer:

1) bob behnken and doug hurley

2)yes

3) august

Research different brands of antivirus software. Compare the capabilities of at least five brands. Dont have the time at the moment to do the research and would greatly appreciate it! Thorough as possible please! :)

Answers

Explanation:

Kaspersky Anti-Virus is a proprietary antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft Windows and macOS, although a version for Linux is available for business consumers.

Bitdefender is a Romanian cybersecurity and anti-virus software company. It was founded in 2001 by Florin Talpeș who is currently the chief executive officer. Bitdefender develops and sells anti-virus software, internet security software, endpoint security software, and other cybersecurity products and services

ESET NOD32 Antivirus, commonly known as NOD32, is an antivirus software package made by the Slovak company ESET. ESET NOD32 Antivirus is sold in two editions, Home Edition and Business Edition

Quick Heal Technologies Ltd, is an Indian cybersecurity software company headquartered in Pune, India. The company was formerly known as CAT Computer Services Ltd and was started as a computer service center in 1995. The company was renamed as Quick Heal Technologies Pvt. Ltd. in 2007

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic that researches and develops computer security software, machine learning and artificial intelligence

Which of these signifies an ethical issue?
A.
An employee using workplace resources for personal work.
B.
A business restricting access to sensitive data.
C.
A company monitoring employees for the use of workplace resources.
D.
A manager allowing only some employees access to a restricted resource.

Answers

The statement which signifies an ethical issue is: A.  An employee using workplace resources for personal work.

What is an ethic?

An ethic can be defined as a set of both written and unwritten values, principles, or rules of moral conduct that guides human behaviors, especially based on what is:

Good or bad.Right or wrong.Just or unjust.Fair or unfair.

What is an ethical issue?

An ethical issue is most likely to occur when a given situation, activity or behavior creates a conflict with morally acceptable standards and principles within an organization or society.

In this scenario, an employee that use workplace resources for his or her personal work signifies an ethical issue because it contradicts the morally acceptable standards and principles of any business organization.

Read more on ethics here: https://brainly.com/question/502735

most of the internal operations in a computer use hexagonal numbering true or false
100 points pls help asap

Answers

Answer:

True

Explanation:

The hexadecimal numbering is the most used numeric system for international operations in a computer, in our daily life we use the decimal system but for the CPU use the byte or octet as a basic unit of memory, we need more than 10 digits, and the hexadecimal system has 16, in addition, the binary system is hard to understand.

The encoding of information directly into long-term storage without the aid of working memory best illustrates
iconic memory
automatic processing
the spacing effect
checking

Answers

The encoding of information directly into long-term storage without the aid of working memory best illustrates automatic processing. :Automatic processing is the encoding of information directly into long-term memory without conscious awareness. Unlike effortful processing, which uses working memory and is a conscious activity,

automatic processing is done unconsciously and does not require working memory to encode information. For example, you don't need to pay attention to what you see to remember what it looks like. Similarly, the emotional states associated with an event can be unconsciously recorded in long-term memory.

Thus, automatic processing allows information to be encoded directly into long-term memory without the need for working memory, which is a limited-capacity storage system that requires conscious effort. Therefore, the main answer is option B "automatic processing".

To know more about processing visit :

https://brainly.com/question/31815033

#SPJ11

Other Questions
At a local manufacturing plant, about 20 percent of the engineers work full-time as independent contractors for a maximum of three years. These employees are seldom offered benefits but may apply for posted permanent positions within the company during this time. HR experts would designate these professionals as Selection is the process of gathering information & deciding who should be hired to meet company staffing needs, under ______ guidelines. why was a convention convened at Annapolis 1786 When selecting an investment, which criterion relates to the expected rate of return on an investment, usually over a period of one year? Two lenses, the first with focal length -12.5 cm and the second with focal length 20.0 cm, are separated by 15.0 cm. If an object is place 50.0 cm in front of the first lens, what is the total magnification Correct the following sentence (neither the girls nor bosco think that making resolutions are useless) use primary Data Sources such as the use of Questionnaires to ask people in Mozambique about impact of tropical cyclone freddy in Mozambique. Use interviews, observations and field trips to collect data about the impact of tropical cyclone freddy in Mozambique. is this statement true or false? although western europe is very industrially developed, agriculture is the main form of land use. responses Point of view in frida Kahlo by the 1850s what which of these was the most effective way to move Goods in the North Required information Skip to question [The following information applies to the questions displayed below.] Franklin Training Services (FTS) provides instruction on the use of computer software for the employees of its corporate clients. It offers courses in the clients offices on the clients equipment. The only major expense FTS incurs is instructor salaries; it pays instructors $6,000 per course taught. FTS recently agreed to offer a course of instruction to the employees of Novak Incorporated at a price of $700 per student. Novak estimated that 20 students would attend the course. Base your answers on the preceding information. Required Relative to the number of students in a single course, is the cost of instruction a fixed or a variable cost? Determine the profit, assuming that 20 students attend the course. Determine the profit, assuming a 10 percent increase in enrollment (i.e., enrollment increases to 22 students). What is the percentage change in profitability? Determine the profit, assuming a 10 percent decrease in enrollment (i.e., enrollment decreases to 18 students). What is the percentage change in profitability? In the context of antitrust sanctions, liability for triple-damages suits is based on __________law and is said to be joint and several. Multiple Choice tort antitrust tax criminal corporate The textbook recommends that you make a fresh set of speaking notes on the eve of your speech.Select one:TrueFalse gertrude's teenage son percival stays out far past curfew, and doesn't text or call to let gertrude know he's okay. when percival comes home, gertrude looks at him with a mixture of relief and anger in her face. gertrude's facial expression is an example of what concept? I need these answers for a bell ringer, and I think im worrying too much, but until i get my grade out of the bad zone, I'm grounded from gaming! A grand solar minimum appears imminent and could soon trigger anew major ice age.True/False A clothing outlet had a sale on jackets. A jacket priced at $233 was on sale, selling for 70% (use 0.7) of its price. How much did customers have to pay for the jacket (ignore taxes)? Question 1a Assume you have been appointed as the new marketing manager for Ekumfi Fruits and Juices Limited, a producer of Ekumfi Pure Juice in Ghana. The company has the possibility of discriminating between its Local and Foreign markets. To help you determine the prices of the products appropriately in order to maximise profit, you engaged the services of an economist who estimated the demand functions for both Local and Foreign market as: P1 = 120 5Q1 Local Market P2 = 200 20Q2 Foreign Market where Q1 and Q2 are the respective quantities of Ekumfi Pure Juice demanded in Local and Foreign markets and P1 and P2 are their respective prices (in GH). If the Average Cost (AC) of Ekumfi Fruits and Juices Limited for producing Ekumfi Pure Jiuce for these two markets is given as AC = 35/Q + 40, where Q = Q1 + Q2. i. What profit will Ekumfi Fruits and Juices Limited make with and without price discrimination? 10 marks ii. What business advice will you give in respect of practicing price discrimination or selling a uniform price? 1 mark iii. If price discrimination is the option to implement within the context of elasticity of demand, what pricing policy should be implemented in each market to raise total revenue? 4 marks Question 1b Cassava is the main commodity in the economy of Makandingi. Given the hardship in the economy, the government increased the salary of all employees in Makandingi. Following this intervention, the number of cassava producers also increased in the community. In a class discussion, Barnabas said these two events would result in an increase in equilibrium price of cassava. Francis, on the other hand, argued that the price would rather decrease. With the aid of a diagram, explain the possible effects of the two events on equilibrium price and quantity, assuming the salary increase has a greater impact and cassava is a normal good. La familia de Catalina A new student, Catalina, has just moved into the residence hall. Listen to this description of her and her family, and decide whether each statement is cierto or falso. A tin has a radius of 3cm anf height 6cm. Find the volume, in litres of the liquid that will fill the tin to capacity, correct to 2 decimal places