Which of the following are supported by dynamic ddl statements?

a. The use of concatenation
b. the use of positional notation
c. the use of static strings
d. the use of bind variables

Answers

Answer 1

Dynamic ddl statements are used to support each of them. the usage of static strings, positional notation, concatenation, bind variables, and static notation.

Which of the following integrated packages allows for dynamic SQL?

PL/SQL programs can access dynamic SQL and dynamic PL/SQL thanks to the DBMS SQL package. The SQL statements you run with this package are not already prewritten into your programs, making them "dynamic."

What DML events allow you to record insert, update, and delete events?

AS OPPOSED TO triggers. triggers for database events and system events. DML triggers let you to record data changes brought on by INSERT, UPDATE, and DELETE statements.

To know more about ddl statements visit :-

https://brainly.com/question/15561457

#SPJ4


Related Questions

Imagine that a you and a friend are exercising together at a gym. Your friend suddenly trips and falls, and it is clear that he or she has suffered an ankle sprain. Luckily you know exactly what has happened. Explain how your friend sustained the injury and, assuming you had the necessary supplies, including a first aid kit and a phone, explain what steps could you take to stabilize your friend's injury.
Name each of the five steps in the PRICE treatment.

Answers

Answer:

The sprain happened when the friend fell and the ligaments (in the ankle)  stretched, twisted or possibly tore. Sprain is manifested by pain, swelling, bruising and inability to move.

Explanation:

Here the appropriate steps to stabilize the injury:

1.       Call for help.

2.       Rest the injured area to avoid further damage.

3.       Put ice ( for 15 to 20 minutes) to help limit the swelling.

4.       Apply compression bandage to prevent more swelling.

5.       Elevate the injured ankle above the heart to limit swelling.

Hope this helps UvU

After auscultating the chest, how will the nurse document findings of bilateral, high-pitched, continuous whistling sounds heard during each expiration?

Answers

The findings of bilateral, high-pitched, continuous whistling sounds heard during each expiration, following the auscultation of the chest, will be documented in the patient's medical record.

This is accomplished by the nurse documenting the findings using the appropriate terminology that will help in communicating with other medical professionals who will be treating the patient.

The sounds you're referring to are called wheezes, and they can indicate a variety of health issues, ranging from asthma to chronic obstructive pulmonary disease (COPD) to bronchitis. They're most commonly heard during expiration, but they may also be heard during inspiration or throughout the respiratory cycle.

When documenting these findings, the nurse should take the following steps:• Identify which side of the chest the wheezes were heard on and whether they were heard during inspiration, expiration, or throughout the respiratory cycle.• Document the pitch and quality of the wheezes. High-pitched wheezes indicate narrowing of the airways, whereas low-pitched wheezes indicate airway obstruction.

• Note any other characteristics of the wheezes, such as whether they are continuous or intermittent.

• Describe any other abnormal findings that were noted during the chest auscultation, such as crackles or rhonchi.

• Indicate whether any intervention was provided, such as administration of bronchodilators, and whether this had any effect on the wheezes.

Documenting the findings of bilateral, high-pitched, continuous whistling sounds heard during each expiration following the auscultation of the chest is an essential aspect of nursing practice. It ensures that the patient's medical record is accurate and up-to-date, which is critical in providing appropriate and effective care.

By documenting the findings using the appropriate terminology and including any other pertinent information, the nurse can communicate effectively with other members of the healthcare team, which ultimately benefits the patient.

To know more about bronchitis :

brainly.com/question/31024710

#SPJ11

When is it appropriate to have your security badge visible.

Answers

The security credential is a way to identify yourself as a member of a security institution.

What is a security credential?

A security credential is a personal document that includes various personal data that accredits an individual as a member of a specialized security group.

When is it appropriate to have the security credential visible?

A security credential is appropriate to have visible when interacting with other people to give them the necessary instructions related to the security of a place.

Learn more about security badge in: https://brainly.com/question/4180037

Take a minute to reflect on your thoughts and learning so far and discuss:

1- the skills you may need to have a career in media arts.

In paragraph form, identify and discuss at least 3 essential skills you need for a career in media arts and why they are important.

2- how the techniques used in different media artworks may reflect varying messages and points of view.

In paragraph form, state a company or product and describe 2 advertising techniques that will be beneficial to advertise it. One of your techniques should address the best type/form to advertise it and why you think it is the best.

Answers

Answer:

To be completely honest, this is a question that you and only you can answer really. You were the one that took the class and we cant reflect on your thoughts for you. I'm not trying to be one of those people, but its the truth.

Explanation:

NEXT
Internet and World Wide Web: Mastery Test
1
Select the correct answer
An instructor receives a text message on her phone. Next, she reads out the text to the whole claws. Which network component plays a similar
role by receiving a message and broadcasting it to all other computers connected to the component?
OA Switch
OB .
hub
OC bridge
OD
router
Reset
Wext

Answers

Answer:

hub is the correct answer

hope it is helpful to you

. If something is copyrighted, how can it be used?
Pilihan jawaban
Only with credit.
Only with permission.
With credit or in certain "fair use" cases.
With permission or in certain "fair use" cases.

Answers

The Institute was established at the initiative of a group of academics, educators, and researchers.

programs to harmonize politics, economics, education, culture, morals, and ethics. It was believed that the required both discipline mastery and a profound awareness of the Divine Patterns that Allah has outlined in His creation (SWT). The International Institute of Islamic Thought (IIIT) USA's publication of Dr. Ismail Raji al Faruqi's idea on the "Islamization of Knowledge" served as the foundation for this argument. The Book provides the viewpoint of several interested and devoted academics. The Institute was established at the initiative of a group of academics, educators, and researchers.

Learn more about argument here-

https://brainly.com/question/12951100

#SPJ4

True or False: Encryption is an effective deterrent against breaches of PHI maintained electronically.

Answers

True. Encryption is an effective method of protecting PHI maintained electronically. It ensures that even if a breach occurs, the information cannot be read or accessed without the appropriate decryption key.

thereby reducing the risk of unauthorized disclosure or theft. It is also a requirement under HIPAA regulations to protect electronic PHI. Decryption is the process of converting encrypted data back into its original form using a decryption key. Encryption is the process of converting plain text data into a scrambled form, which can only be read by someone with the decryption key. Decryption is used to protect sensitive information from unauthorized access by hackers and other malicious actors.

The process of decryption involves using the decryption key to reverse the encryption process, transforming the encrypted data back into its original form. Decryption is used in various contexts, including online transactions, secure messaging, and data storage. Decryption can be done using software tools, such as decryption software, or by hand using mathematical algorithms.

However, decryption can also be a security risk if the decryption key falls into the wrong hands. It is therefore important to use strong encryption algorithms and to store decryption keys securely.

Learn more about Decryption here:

https://brainly.com/question/29765762

#SPJ11

if you choose a one-time backup, you can create a system state backup. T/F

Answers

The statement "if you choose a one-time backup, you can create a system state backup" is TRUE.

What is a one-time backup?

A one-time backup, also known as a manual backup, is a backup process that allows you to create a backup of your data or system once, rather than automatically. You must initiate the process manually in order to complete the one-time backup.

The System State Backup is a backup utility that comes with the Microsoft Windows operating system that enables you to back up important system-related components such as system settings, user profiles, hardware configurations, and boot files.

The System State Backup option is available on Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019, as well as some Windows 10 and 8.1 versions. It is a type of backup that enables users to quickly restore their computer or server to a previous state if it becomes corrupted or fails.

Learn more about backup at

https://brainly.com/question/29590057

#SPJ11

Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.

Answers

\( \implies \huge \tt \underline \red{answer}\)

Hlo

how did printing help with travel to new world

Answers

Printing aided in the spread of knowledge throughout many locations and made mass-production of writing, art, and maps possible and thus in this way printing help with travel to new world.

What is Mass production?

The production of large quantities of standardized products, often using assembly lines or automation technology, is known as mass production. Mass production makes it possible to efficiently produce a large number of similar products.

Repetitive flow production, Flow production, series production and also serial production are all terms used to describe mass production.

Mechanization is used in mass production to achieve high volume, detailed material flow organization, careful control of quality standards, and labor division.

To know more about Printing, visit: https://brainly.com/question/27962260

#SPJ4

What are movies filmed before 1990's?

Answers

Answer: Once Upon a Time in the West (1968) PG-13 | 165 min | Western. ...

Cinema Paradiso (1988) R | 155 min | Drama. ...

Blade Runner (1982) R | 117 min | Action, Sci-Fi, Thriller. ...

2001: A Space Odyssey (1968) G | 149 min | Adventure, Sci-Fi. ...

Apocalypse Now (1979) ...

Chinatown (1974) ...

Stardust Memories (1980) ...

Le Notti Bianche (1957)

Explanation:

In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system. (True or False)

Answers

True. In a chosen-ciphertext attack, cryptanalysts submit data that has been coded with the same cipher and key that they are trying to break to the decryption device.

The aim of this attack is to observe either the plaintext output or the effect that the decrypted message has on some system, in order to gain insight into the cipher and ultimately break it. Chosen-ciphertext attacks are often used by attackers to exploit vulnerabilities in encryption systems, and they are a common type of attack used in cryptanalysis. By submitting specially crafted data to the encryption system, attackers can gain valuable information about the inner workings of the cipher, which can be used to launch further attacks and ultimately break the encryption.

To protect against chosen-ciphertext attacks, it is important to use strong encryption algorithms and to follow best practices for key management and data security. Additionally, regular security audits and vulnerability assessments can help to identify potential weaknesses in encryption systems and mitigate the risk of attacks.

Learn more about cryptanalysts here:

https://brainly.com/question/14232194

#SPJ11

can anyone explain what a product and service based website is

Answers

A product-based website and a service-based website are two types of websites that cater to different business models.

They both aim to promote and sell offerings online but have distinct characteristics and purposes. A product-based website is designed to showcase and sell physical or digital products. It typically includes product descriptions, images, pricing, and a shopping cart for online purchases. E-commerce platforms like Amazon and Etsy are examples of product-based websites. These sites focus on providing detailed information about products to help customers make informed purchasing decisions. They often include customer reviews, shipping options, and return policies to enhance the user experience. On the other hand, a service-based website is centered around promoting and selling services provided by individuals or businesses.

These services can range from consulting, coaching, and technical support to creative and educational services. Service-based websites often emphasize the expertise and experience of the service provider, using testimonials and case studies to demonstrate their value. They typically have contact forms or booking systems to allow potential clients to inquire about or schedule the services offered. In summary, a product-based website focuses on selling physical or digital goods, while a service-based website promotes and sells various types of services. Both types of websites use different strategies and features to engage their target audience and facilitate the desired transactions.

Learn more about information here: https://brainly.com/question/31370803

#SPJ11

Which of the following statements is true?
O Secondary storage stores data for short periods of time.
O A hard drive is an example of secondary storage.
O The CPU holds instructional data for programs.
Audio data is saved to a computer's CPU.

Answers

C is the answer I think not sure

The statement true for the secondary storage device, is that hard drives are the example of secondary storage. Thus, option B is correct.

What is a secondary storage?

A secondary storage in the computer system is given as the non-volatile form of the storage media that has the ability to form the storage without being connected to power.

The secondary storage can be of solid state, optical and magnetic storage devices. Hard drive is the example of magnetic secondary storage devices. Thus, option B is correct.

Learn more about secondary storage, here:
https://brainly.com/question/86807

#SPJ2

Explain the advantages and disadvantages of forwarding an email.

Answers

Constant Two-Way Communication. The first benefit of email forwarding services is they can often send a reply message to your customers within minutes of receiving a reply. ...
Save Time. Another advantage is that these services help save your employees time. ...
Avoid Missing Important Emails.


Email forwarding won't work if you have a mail product set up on the domain name. Mail for your domain name can only be sent to one place. ...
Forwarding does not allow you to customize spam settings. ...
Forwarding will only deliver attachments up to 10MB. ...
Wildcard forwarding is not supported.

Select the correct answer from each drop-down menu.

1. Phishing, Spoofing, Sniffing
2. Denial of Service, Social Engineering, Network Hijacking

Select the correct answer from each drop-down menu.1. Phishing, Spoofing, Sniffing2. Denial of Service,

Answers

Based on the scenario given, Since the security devices on the network shows no sign of abnormal traffic from the outside, the unauthorized user likely carried out  a Sniffing or other  Network Hijacking attack.

What is meant by sniffing attack?

The "sniffing attack" mean if or when a hacker employs a packet sniffer to collect and read sensitive data traveling via a network, it is called a sniffing attack.

Note that Unencrypted email communications, login credentials, as well as financial data are those that are typical targets for these assaults.

Therefore based on the above, the attacker is Sniffing as well as the use of other forms of network Hijacking.

Learn more about Network Hijacking from

https://brainly.com/question/28364348
#SPJ1

Word processing software is used primarily by schools rather than businesses.
True or false

Answers

Answer:

False.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Generally, the Microsoft Word software is used by various businesses for processing and formatting text-based documents.

In Microsoft Word, formatting refers to the appearance of texts in a document.

Formatting a text involves performing tasks such as, bold, underline, italics, font-size, font-types, color etc. The commands to perform the above tasks are mainly found in the format menu of the Home tab.

Formatting a document is important and necessary because it makes the word document clear and easy to read.

Hence, Word processing software such as Microsoft Word, Notepad, etc., is used primarily by businesses rather than schools because most businesses deal with the creation and transfer of documents from one department to another or to other businesses.

This ultimately implies that, business firms or organizations are more inclined to use Word processing software to create paper documents for the day-to-day business activities they conduct unlike a school who rarely does.

rotate object while holding the shift key. what does it do?

Answers

Answer:

It rotates it 45 degrees in a direction

For anyone in the digital community to use technology as fully as possible everyone needs to have
access

Answers

Answer: is that the question?

Answer:

Internet access?

Explanation:

Is that the full question?

g o o g l e h a n g o u t ??

Answers

G Hangouts is a cross platform messaging app developed by G. Originally a feature of G Plus, G Hangouts became a stand-alone product in 2013.

a program is expressed in a programming language. which of the following is true of the program? a program is expressed in a programming language. which of the following is true of the program? the program can also be expressed as binary code, which is what the program will be translated to in order to execute on the computer some parts of the program can be expressed as binary code, but most features of programming languages cannot be translated to binary code. the program can also be expressed as binary code, but this increases the likelihood of errors the program cannot be expressed as binary code

Answers

A program is essentially a set of instructions that tell a computer what to do.

These instructions are written in a programming language, which is a human-readable and understandable format. However, a computer does not understand programming languages directly. Therefore, the program needs to be translated into machine-readable code, which is binary code consisting of 1's and 0's. So, the correct answer to the question is that the program can also be expressed as binary code, which is what the program will be translated to in order to execute on the computer. However, it is not true that the program cannot be expressed as binary code. In fact, most programming languages can be translated into binary code. However, some parts of the program, such as comments and certain programming constructs, cannot be translated into binary code.

It is also not true that expressing the program as binary code increases the likelihood of errors. In fact, the translation process from programming language to binary code is highly controlled and standardized, which helps to minimize errors. However, errors can still occur during the translation process or due to other factors such as hardware or user input. In conclusion, a program is expressed in a programming language, which can be translated into binary code for execution on a computer. The translation process is highly controlled and standardized, and most programming languages can be translated into binary code.

Learn more about  program here: https://brainly.com/question/30613605

#SPJ11

Do these codes look right for the following 5 statements. This is using Oracle SQL:
Write a query that displays the title, ISBN, and wholesale cost of books whose wholesale cost is more than the average of all books. Format the retail price with dollars and cents.
Write a query that displays the title and publication date of the oldest book in the BOOKS table. Format the date with the complete name of the month and a comma after the day of the month, like "January 3, 2011."
Write a query that shows the title(s) of the book most frequently purchased by the customers in the database. Use the quantity column from the orderitems table to find the book most frequently purchased.
Write a query that displays the names of the customers who purchased the book with the highest retail price in the database. Capitalize the first and last names.
Write a query that displays the first name and last name of each author along with the number of books he or she has written. Capitalize the first and last names.
--1
SELECT title, isbn, cost, TO_CHAR(retail, '$999.99') AS retail
FROM books
WHERE cost <
(SELECT AVG (cost)
FROM books);
--2
SELECT title
TO_CHAR(pubdate, 'Month DD, YYYY') "Publication Date"
FROM books;
--3
SELECT title
FROM books
WHERE isbn = (select isbn from orderitems HAVING SUM (quantity) = (select MAX(SUM(quantity))
FROM orderitems
GROUP BY isbn);
--4
SELECT INITCAP (firstname) AS "First Name", INITCAP (lastname) AS "Lastname"
FROM customers
JOIN orders Using (customer#)
JOIN orderitems Using (Order#)
JOIN books USING (isbn)
WHERE retail =
(SELECT MAX(retail) FROM books;
--5
SELECT fname, lname, booknum AS "Number of Books"
FROM author join
(SELECT COUNT (isbn), booknum, authorid
FROM bookauthor
GROUP BY authorid)
USING (authorid);

Answers

All the above codes are correct and will query according to requirements. Here is part-wise solution and explanation to the codes.

1. SELECT title, isbn, cost, TO_CHAR(retail, '$999.99') AS retail
FROM books
WHERE cost >
(SELECT AVG (cost)
FROM books);
The above code is correct as it will retrieve the title, ISBN and wholesale cost of all the books whose wholesale cost is greater than the average of all the books. And the retail price is displayed in the format of dollars and cents.

2. SELECT title, TO_CHAR(pubdate, 'Month DD, YYYY') "Publication Date"
FROM books
WHERE pubdate IN (SELECT MIN(pubdate)
FROM books);
The above code is correct as it will retrieve the title and publication date of the oldest book from the table BOOKS. The date is displayed in the format of complete name of the month and a comma after the day of the month.

3. SELECT title
FROM books
WHERE isbn IN (SELECT isbn
FROM orderitems
GROUP BY isbn
HAVING SUM(quantity) = (SELECT MAX(freq) FROM
(SELECT COUNT(*) freq, isbn
FROM orderitems
GROUP BY isbn)));
The above code is correct as it will retrieve the title of the book that is most frequently purchased by the customers in the database. The quantity column from the orderitems table is used to find the book most frequently purchased.

4. SELECT INITCAP (c.firstname) "First Name", INITCAP (c.lastname) "Last Name"
FROM customers c, orderitems o, books b, orders r
WHERE c.customer# = r.customer# AND
r.order# = o.order# AND
o.isbn = b.isbn AND
b.retail = (SELECT MAX(retail) FROM books);
The above code is correct as it will retrieve the names of the customers who purchased the book with the highest retail price in the database. The first and last names are capitalized.

5. SELECT INITCAP(a.fname) AS "First Name", INITCAP(a.lname) AS "Last Name", COUNT(b.isbn) AS "Number of Books"
FROM bookauthor ba, books b, author a
WHERE ba.isbn = b.isbn AND
ba.authorid = a.authorid
GROUP BY ba.authorid, a.fname, a.lname;
The above code is correct as it will retrieve the first name and last name of each author along with the number of books they have written. The first and last names are capitalized.

Learn more about SQL: https://brainly.com/question/31663284

#SPJ11

In terms of technolagy, soft wear is defined as

Answers

Answer:

the programs and other operating information used by a computer.

Explanation:

somthing like windows or linux.

Which feature allows a function to return a value?
O A. Function return
OB. Control structure
OC. Function parameter
OD. Repeat variable
its a

Answers

A. Function return is the feature that allows a function to return a value.

what is the hardest codes to input

first to answer get brainlyiest

Answers

Answer:

computers

Explanation:

What type of filter do we use to isolate the "ess" frequency in the side chain?

Answers

To isolate the "ess" frequency in the side chain, we typically use a band pass filter that is specifically designed to target the range of frequencies where "ess" sounds are most prominent. This filter is then applied to the side chain signal to extract the "ess" frequencies, which can then be used for a variety of purposes, such as de-essing or enhancing the clarity of vocals in a mix.

A band pass filter allows a specific frequency range to pass through while attenuating frequencies outside that range. By setting the band pass filter to the frequency range of the "ess" sound, you can isolate it and use it as the side chain input for the compressor.

Here are the steps to set up a band pass filter in the side chain:

Insert an equalizer or filter plugin on the lead vocal track.Set the filter type to a band pass filter.Adjust the frequency range of the filter to isolate the "ess" sound.Route the output of the lead vocal track to the side chain input of the compressor on the electric guitar track.Set the compressor's threshold, ratio, attack, release, and makeup gain to taste.

For more information about band pass, visit:

https://brainly.com/question/31424377

#SPJ11

A PC that you are investigating has an IP address of 10.1.1.23. Without any further information, which of the following can you conclude from this IP address assignment?
A. This is a LINKLOCAL network address assigned by Automatic Private IP Addressing.
B. The PC must be part of an enterprise level network.
C. The IP address was statically assigned
D. The PC is a LAN client not connected directly to the Internet.

Answers

This IP address assignment leads to the conclusion that the PC is a LAN client and not directly linked to the Internet.

Among the following, which one can be an IP address?

An IP address is written as four digits separated by periods, using a 32-bit format. Every number is between 0 and 255. An IP address might be 1.160. 10.240, for instance.

Which of the following methods is used to give a device an IP address?

Dynamically allocating an Internet Protocol (IP) address to any device or node on a network so they can connect using IP is done using the network management protocol known as DHCP (Dynamic Host Configuration Protocol).

To know more about IP address visit:-

https://brainly.com/question/16011753

#SPJ4

patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. which of the following apps should she use for cloud storage?

Answers

Based on the above, the apps that  Patricia need to use for cloud storage is called a Drop box.

What is a Dropbox?

The Dropbox is known to be a Software that is said to be a file making work known to be made by the American company.

It has its headquartered to be in U.S. and it is known to be a software that offers a lot of services such as:

A cloud storage, File synchronizationPersonal cloud, A client software.

Note that a cloud storage is known to be a kind of cloud computing model that helps to save data on the Internet via the use of a cloud computing provider who helps to handle and runs the data storage as a form of service.

Therefore, Based on the above, the apps that  Patricia need to she use for cloud storage is called a Drop box.

Learn more about Drop box from

https://brainly.com/question/27327971
#SPJ1

is someone using social media

Answers

Almost everyone uses social media

Which of the following is correct? O A LIFO always have a higher price O B. None of these is correct OC. FIFO always have a higher price O D. WAC always give lower price than FIFO

Answers

The correct option is A. LIFO always have a higher price.LIFO or Last In, First Out is a costing method that is commonly used for inventory purposes. This technique assumes that the newest products in the inventory are sold first.

This means that the cost of the latest purchases is matched against the revenues first, leaving the oldest inventory as an asset. LIFO provides a more accurate cost of goods sold during periods of inflation. However, the accounting method does not match the physical flow of goods. LIFO can result in lower net income, which also leads to lower taxes, but it has a higher ending inventory balance and a lower cost of goods sold.The average price of the older items decreases over time under LIFO, implying that inventory costs are lower. As a result, LIFO results in a higher price of inventory and, as a result, a higher cost of goods sold.

Know more about inventory purposes, here:

https://brainly.com/question/30019346

#SPJ11

Other Questions
Which of the montages you watched did you find most successful and why. (at least a paragraph with specific reasons) Joanne measured the height Heights and arms spins of the girls on the basketball team. She plot the data and makes a scattershot comparing Heights and arm spins, and inches. Joann finds that the train line that best fit her results has the equation y = + 2. If a girl on her team is 63 in tall, what should Joanne expect her arm Spin To be ? FILL IN THE BLANK. an unbiased statistic is one in which the average value of the statistic is __ the population parameter. different jobs within the same profession may require more or less education. t/f Answer the questions fast pls and no link In paragraph 2, how does the senator justify his position that undeveloped land should notbe used to sustain the life of immigrants?A He proposes that the undeveloped land be set aside and used by currentAmericans and their future generations.. He proposes that this undeveloped land be set aside for Native AmericanreservationsC. He proposes that this undeveloped land be set aside as reserved as it is for thebetterment of the environment.He proposes that this undeveloped land be used only by the new, currentimmigrantsD it is a thin muscles that contracts and relaxes to help the air go in and out? using the ordered pairs (x, y) in the tablewhat is the proportionality constant or the rate of change? 12:47 PM Mon Apr 2541%Armando doesn't feel that clearing snow from his driveway is necessary. In the last snowstorm, his neighbor came by to check on him andslipped and injured her back. When she got out of the hospital, she decided to pursue a claim against Armando for the pain and suffering sheexperienced because of the fall. Which coverage would the claim likely fall under? 3. Complete each measure by adding just one C to each, so the counts add up to 4:And Number 4 pls. he following information is reported for the current year for North Atlantic Division of XT Enterprises:Sales$3,800,000Interest expense$250,000Net income$500,000Total assets$5,000,000Noninterest-bearing current liabilities$400,000Cost of capital8%Required rate of return14%Tax rate30%How much is the divisions invested capital?a. $5,400,000b. $5,000,000c. $4,600,000d. $5,500,000 7. There are 19 red marbles for every black marble. If there are 120 marbles in the bag, how many red marbles are there? Explain or show your reasoning. what two actions did manufacturers do in the 19th century to shift focus from a production orientation to a marketing orientation? Some 50 years on, the idiocy hasnt changed, except for the hue of the honcho note that its always the men who demand more babies. Now its Julius Malema, who has for years now been issuing periodic calls upon black women to produce more babies "for the revolution". According to Malema, "White people do not want us to give birth because they know we are more than them. So that they can be more than us and the day they are more than us they will take over our land" The Nat call for "Botha babies" was, deservedly, a resounding flop. From 1968 to 1994, whites increased by a quarter from 3.6m people to 4.4m. The black African population, however, more than doubled from 14.7m to 30m. According to StatsSA figures just released, the total SA population is now 57.7m, from 38.6m in 1994. The black African population is 46.7m, whites are 4.5m, coloureds 5.1m, and Indians 1.4m. Demographics is a textbook example of the power of compounded growth rates. Over time, small numbers have huge effects, as is reflected in the fact that the United Nations as recently as 2016 estimated that SA would reach the 58m population level only in 2022. SAs fertility rate is a respectable 2.4% 2.1% is population replacement level especially when compared to the rest of sub-Saharan Africa, where it approaches 5%. But when broken down, it varies considerably, according to the most recent government estimate I could find, that date to 1998: 1.5% for whites, 2.2% for Indians, 2.3 for coloureds and 4.3% for black Africans. Population pressure is not a crisis somewhere down the line that can be tackled by debates at imbizos and summits. It is a crisis right now. SAs economy is simply not growing fast enough, with the gap between population growth and economic growth getting steadily wider. In fact, each year, we are collectively getting about a percentage point poorer. We have arguably the greatest unemployment crisis in the world and it is getting worse, not better. In SA, only 43% of adults work, in most countries that figure exceeds 60%1.With reference to the article, discuss how population growth affects development.2.Do you agree that the population growth is influenced by the unemployment rate of (32%) in South Africa? In order to consolidate his rule, the Song Emperor Taizou strengthened the centralisation of power on the advice of the Chancellor Zhao Pu. He hosted a banquet and relieved Shi Shouxin and othersof their military power. What is this famous in history? The line plot displays the cost of used books in dollars.A horizontal line starting at 1 with tick marks every one unit up to 9. The line is labeled Cost in Dollars, and the graph is titled Cost of Used Books. There is one dot above 2, 4, 8, and 9.There are two dots above 6 and 7. There are three dots above 3.Which measure of center is most appropriate to represent the data in the graph, and why? The mean is the best measure of center because there are no outliers present. The mean is the best measure of center because there are outliers present. The median is the best measure of center because there are no outliers present. The median is the best measure of center because there are outliers present.hurry Four people participate in a rope competition. Two of them pull the rope right exerting forces of magnitude 330 N and 380 N. The other two pull left exerting forces of magnitude 320 N and 410N. explain how you would caliculate the area of a cross section of the dam without calculus. use your explanations to calculate the area of the cross section 2. On September 1, 2012, Sanchez Corp. sold a $700 million bond issue to finance the purchase of a new factory. These bonds were issued in $1,000 denominations with a maturity date of September 1, 2052. The bonds have a coupon rate of 10.00% with interest paid semiannually. Required: a) Determine the value today, September 1, 2022 of one of these bonds to an investor who requires an 8 percent return on these bonds. Why is the value today different from the par value? b) Assume that the bonds are selling for $1,150.00. Determine the current yield and the yield-tomaturity. Explain what these terms mean. c) Explain what layers or textures of risk play a role in the determination of the required rate of return on Sanchez's bonds. y is directly proportional to x.When y = 30, x = 6a) Work out an equation connecting y and x.b) Work out the value of y when x = 12.