How many rows of data are returned after executing the following statement?
SELECT DEPT_ID, SUM(SALARY) FROM EMP
GROUP BY DEPT_ID HAVING SUM(NVL(SALARY,100)) > 400;
Assume the EMP table has ten rows and each contains a SALARY value of 100, except for one, which has a null value in the SALARY field. The first and second five rows have DEPT_ID values of 10 and 20, respectively.

Answers

Answer 1

2 rows of data are returned after executing the following statement.

Two groups are created based on their common DEPT_ID values. The group with DEPT_ID values of 10 consists of five rows with

SALARY values of 100 in each of them. Therefore the SUM(NVL(SALARY,100)) function returns 500 for this group and it satisfies the

HAVING SUM(SALARY) > 400 clause. The group with DEPT_ID values of 20 has four rows with SALARY values of 100 and one row with

a null SALARY SUM(NVL(SALARY,100)) returns 500 and this group satisfies the HAVING clause. Therefore two rows are returned.

Learn more about Rows:

brainly.com/question/30256801

#SPJ4


Related Questions

Marte uses code to program software and/or web pages. Marte's job is in which digital media field? A. Animation B. Graphics C. Video production. D. Web design.

Answers

Marte uses code to program software and/or web pages. Marte's job is in graphics digital media field.

Any sketch, drawing, or unique network that pictorially expresses some significant information is referred to as a graphic. When a collection of photographs needs to be edited or when an image needs to be created using computer pixels, computer graphics is utilized. Digital photography, movies, entertainment, electronic devices, and any other necessary fundamental technologies can all benefit from computer graphics. It is a broad topic and area in the study of computers. Computer graphics are utilized for many different things, including UI design, rendering, geometric objects, and animation. A common acronym for computer graphics is CG. Computer graphics are implemented using a variety of tools. Marte should use graphics for digital media.

Know more about graphics:

https://brainly.com/question/11764057

#SPJ4

please explain five reasons why excel is used in the business environment. use the web to do your research. you will need to post your reference/s in apa format at the end of your post to meet the discussion board grading rubric. do not forget to post your reference/s in apa format. include at least 1 full paragraph (3-5 sentences minimum)

Answers

Five reasons that excel is used in the business environment are (i) People Management. (ii) Managing Operations. (iii) Performance Reporting. (iv) Office Administration. (v) Strategic Analysis.

What does the term "business environment" mean?

The phrase "business environment" refers to the whole of all individuals, groups, and other entities that operate independently of industry but have the potential to influence its output. The nature of the business environment is dynamic since it is ever-changing (uncertainty). For instance, changes in governmental regulations, consumer preferences and tastes, and technological advancements, etc. Businesses can examine the tactics and strategies of their rivals thanks to the business environment. They can also develop their own strategies in accordance. A brief glance at the telecom industry reveals that nearly all carriers offer comparable services at comparable costs.

Learn more about the Excel here: https://brainly.com/question/24749457

#SPJ4

An author is considering publishing an e-book using a Creative Commons license. In which of the following situations would it be better for the author to use a Creative Commons license instead of a traditional copyright?I. The author wants to make the e-book available as a free download.
II. The author wants to prevent people from sharing copies of the e-book on peer-to-peer networks.
III. The author wants to allow people permission to use and modify the e-book

Answers

I. The author wants to make the e-book available as a free download.

III. The author wants to allow people permission to use and modify the e-book content.

What is e-book?

An e-book, or electronic book, is a digital version of a traditional printed book. It is an electronic version of a book that can be read on a computer, laptop, tablet, or dedicated e-reader device. E-books are typically published in a variety of formats, including PDF, ePub, HTML, and Mobipocket, and can include interactive elements such as audio, video, and hyperlinks. E-books are usually available for purchase from online book retailers, and can also be borrowed from public and university libraries.

To know more about E-book

https://brainly.com/question/28019380

#SPJ4

A threat assessment has identified a risk whereby an internal employee could exfiltrate sensitive data from production host running inside AWS (Account 1). The threat was documented as follows:Threat description: A malicious actor could upload sensitive data from Server X by configuring credentials for an AWS account (Account 2) they control and uploading data to an Amazon S3 bucket within their control. Server X has outbound internet access configured via a proxy server. Legitimate access to S3 is required so that the application can upload encrypted files to an S3 bucket. Server X is currently using an IAM instance role. The proxy server is not able to inspect any of the server communication due to TLS encryption. Which of the following options will mitigate the threat? (Choose two.)A. Bypass the proxy and use an S3 VPC endpoint with a policy that whitelists only certain S3 buckets within Account 1.B. Block outbound access to public S3 endpoints on the proxy server.C. Configure Network ACLs on Server X to deny access to S3 endpoints.D. Modify the S3 bucket policy for the legitimate bucket to allow access only from the public IP addresses associated with the application server.E. Remove the IAM instance role from the application server and save API access keys in a trusted and encrypted application config file.

Answers

An internal employee running a production server inside of AWS could be at danger of leaking sensitive data, according to a threat assessment (Account 1).

Which of the following options will mitigate the threat?

This is how the threat was recorded:

Definition of threat By configuring login information for an AWS account (Account 2) they control and uploading data to an Amazon S3 bucket they control, a malicious actor might transfer sensitive data from Server X.

An outgoing proxy server is used by Server X to access the internet. The programme cannot upload encrypted files to an S3 bucket without proper authorization from S3. The IAM instance role being used by Server X right now. Because TLS encryption is used, the proxy server is unable to examine any server communication.

Which of the ensuing possibilities will lessen the danger? Selecting two.

A. Avoid using the proxy and employ an S3 VPC endpoint with a policy that only whitelists particular S3 buckets inside Account 1.

B. On the proxy server, prevent outgoing access to open S3 endpoints.

C. Set up Server X's Network ACLs to prevent users from accessing S3 endpoints.

D. Change the legal bucket's S3 bucket policy to restrict access to only IP addresses that are publicly available and are linked to the application server.

E. Detach the IAM instance role from the application server and save the API access keys in a trusted and encrypted application configuration file.

To Learn more About threat assessment refer TO:

https://brainly.com/question/28377592

#SPJ4

The primary transformation of data into information takes place in which of the following activities?
a. Input.
b. Storage.
c. Processing.
d. Output.

Answers

According to the problem the primary transformation of data into information takes place in Processing .

What do you mean by Processing ?

Information technology, which includes computers and other digital electronic devices, is the term used to describe the process of manipulating digital information (IT). Business software, operating systems, computers, networks, and mainframes are examples of information processing systems. The term processing refers to an intricate procedure or treatment, such as the processing that coffee beans go through before being turned into a hot beverage. The term "processing" is frequently used to describe the actions taken on food or other items before they are sold or consumed.

To know more about Processing , visit
brainly.com/question/17741763
#SPJ4

A technician is configuring a high-performance workstation. The technician needs to choose storage for the boot drive with the highest performance possible.
Which of the following drive types BEST meets this requirement?A. MicroSD
B. 15K rpm
C. NVMe
D. USB flash

Answers

NVMe is the best boot drive with the highest performance possible.

What is Drive?

Drive is a cloud-based file storage and synchronization service developed by MNC. It allows users to store files in the cloud, synchronize files across devices, and share files.

Drive also includes  Docs, Sheets, and Slides, which are productivity applications that allow users to create, edit, and collaborate on documents, spreadsheets, and presentations.

With Drive, users can store their documents and other files in one place and access them from any device with an internet connection. Drive also allows users to share files with others and collaborate in real-time.

To know more about Drive

https://brainly.com/question/6582950

#SPJ4

consider the following correct implementation of the selection sort algorithm.public static void selectionsort(int[] elements){for (int j

Answers

The call to selection causes the statement elements[minded] = temp; in line 19 of the method to be executed three times.

The declared array is 30 40 10 50 20; int [] err; The selection Sort method would be used to sort the array shown above. Flip the numbers 10 and 30 around. Move the numbers 20 and 40 around. exchange the new position of 40 for the number 50. Consequently, line 19 of the selection Sort algorithm would be run three times. Anyone static can access the method because it has the access specifier public. Accessing static members in this situation is independent of the object. This means that the method returns a void or nothing at all. A grouping of homogeneous (same type) components is known as an array. Option "B" is the appropriate way to provide a two-dimensional array into a function in the computer language; the following options are incorrect:

Learn more about The selection Sort algorithm here:

https://brainly.com/question/22079506

#SPJ4

Modify this query so the InsuranceType field is hidden in the query results, and then run the query

Answers

The modified query will hide the InsuranceType field from the query results by adding a condition to the WHERE clause that excludes any rows with a null value in the InsuranceType field.

SELECT CustomerName, PolicyNumber, PolicyStartDate, PolicyExpireDate

FROM Insurance

WHERE InsuranceType <> 'Life';

SELECT CustomerName, PolicyNumber, PolicyStartDate, PolicyExpireDate

FROM Insurance

WHERE InsuranceType <> 'Life'

AND InsuranceType IS NOT NULL;

What is query?

A query is a set of instructions or commands used to access, modify, or retrieve data from a computer database. It can be used to ask questions, search for specific information, or even manipulate data. Queries can be written in a variety of different languages, the most popular being SQL (Structured Query Language). Queries are used in many types of software applications, including web programming, desktop applications, and even mobile applications. Queries can help to quickly and easily access the information that is needed for a particular task. They are also a useful way of managing large amounts of data, as they can be used to filter out only the information that is needed.

To learn more about query
https://brainly.com/question/25266787
#SPJ4

Write a program that asks the user for a positive integer no greater than 15. The program should then display a square on the screen using the character "X". The number entered by the water will be the length of the side of the square. For example if the user enters 5, the program should display the following: Imagine that you and a number of friends go to a restaurant and when you ask for the bill you want to split the amount and the tip between all. Write a function that takes the total bill amount, the tip percentage (e.g. 15.0 for a 15% tip), and the number of friends as inputs and returns the total bill amount as its output. Write a main function double CalculateAmountPerPerson (double TotalBill, double TipPercentage, ist NumFriends) that asks the user for the total amount of the bill and the size of his/her party (i.e. number of friends) and prints out the total amount that each person should pay for tip percentages of 10% 12.5% 15% 17.5% 20% 22.5% 25% 27.5% and 30%. Your main function should use a loop and invoke the CalculateAmountPerPerson function at each iteration.

Answers

Your main function should use a loop and invoke the Calculate Amount Per Person function at each iteration.

#include <iostream>

using namespace std;

//Function to calculate the amount due per person

double CalculateAmountPerPerson (double TotalBill, double TipPercentage, int NumFriends)

{

   double TipAmount = TotalBill * (TipPercentage/100);

   double AmountPerPerson = (TotalBill + TipAmount)/NumFriends;

   

   return AmountPerPerson;

}

//Main function

int main()

{

   double TotalBill;

   int NumFriends;

   

   //Prompt the user for Total Bill and Number of Friends

   cout << "What is the total bill amount? ";

   cin >> TotalBill;

   cout << "How many friends are splitting the bill? ";

   cin >> NumFriends;

   

   cout << "\n";

   

   //Loop to calculate the amount due per person for the different tip percentages

   for (double TipPercentage = 10.0; TipPercentage <= 30.0; TipPercentage += 2.5)

   {

       double AmountPerPerson = CalculateAmountPerPerson(TotalBill, TipPercentage, NumFriends);

       cout << "For a " << TipPercentage << "% tip, each person should pay $" << AmountPerPerson << "." << endl;

   }

   

   return 0;

}

What is function?

A function is a self-contained block of code that performs a specific task. Functions are often used to organize code and make it easier to read and debug. Functions help to break up long and complex programs into smaller, simpler pieces. By using functions, code can be reused, making the development process more efficient. Functions can also be used to pass data back and forth between different parts of a program. In many programming languages, functions must be declared before they can be used.

To learn more about function
https://brainly.com/question/179886
#SPJ4

you've used bitlocker to implement full volume encryption on a notebook system. the notebook motherboard does not have a tpm chip, so you've used an external usb flash drive to store the bitlocker startup key. you use efs to encrypt the c:\secrets folder and its contents. which of the following is true in this scenario? (select two.)

Answers

The foundation of favorable circumstances is found in both the past and the present.

For instance, we might relocate to a city. In the fall, he'll probably return to school. It would be great if we could complete the task before tomorrow. The worst-case scenario would be that we would have to restart the project. Scenarios are purposefully unstructured, imperfect, and intermittent narrative representations of significant use situations occurring throughout time. A usage scenario is a description of how someone may use a system or product that currently exists. A design scenario is an explanation of the intended application of a system or product that is still under development. A scenario in literature could be a description of what is happening or the state of the situation right now.

Learn more about Scenario here:

https://brainly.com/question/29857045

#SPJ4

Give an example of a for loop where symmetric bounds are more natural. Give an example of a for loop where asymmetric bounds are more natural.

Answers

An instance of a for loop where symmetric bounds make more sense is when a block of statements is executed a predetermined number of times, for instance ten times: I in range for (10)

When iterating through the string, usually use an asymmetric loop: for char in string

What is loop?

A loop in computer programming is a set of instructions that are repeatedly carried out until a particular condition is met. Typically, after completing a particular process, such as getting and changing a piece of data, a condition, such as whether a counter has reached a specific number, is checked.

If it hasn't, the following instruction in the sequence directs the computer to go back to the first instruction and repeat the sequence. If the condition is met, the following instruction "falls through" to the following sequential instruction or branches outside of the loop. In writing programmes, loops are a fundamental concept in programming that are frequently used.

To learn more about Symmetric bounds and Asymmetric bounds :

brainly.com/question/13567401

#SPJ4

You purchase a DNS domain named contoso.com.

You create an Azure public DNS zone named contoso.com that contains a host record for Server1.

You need to ensure that internet users can resolve the name server1.contoso.com.

Which type of DNS record should you add to the domain registrar?

Select only one answer.

A

NS

SOA

TXT

Answers

The type of DNS record that should be added to the domain registrar is option B: NS (Name Server)

What is  DNS domain?

When you purchase a domain name, it needs to be registered with a domain registrar. The domain registrar is responsible for maintaining a record of the nameservers associated with the domain.

Therefore, In order to ensure that internet users can resolve the name server1.contoso.com, you need to associate the name servers of the Azure public DNS zone contoso.com with the domain name contoso.com at the domain registrar. This is done by adding an NS (Name Server) record to the domain registrar's DNS configuration.

Learn more about   DNS domain from

https://brainly.com/question/27960126

#SPJ1

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)- TACACS+- 802.1x- AAA- PKI- RADIUS- EAP

Answers

- TACACS+ and - RADIUS  are methods for providing centralized authentication, authorization, and accounting for remote access .

What is authentication
Authentication is the process of verifying the identity of a user or a process. It is used to ensure that only authorized users are able to access a system or data. Authentication is typically done through the use of usernames, passwords, biometric data, or tokens. It is important for data security and is used to protect information from unauthorized access.

When a client has to be certain that the client is the system it purports to be, the client uses authentication. The user or machine must demonstrate their identity to the client or the server during authentication. A username and password are often required for server authentication.

To know more about authentication
https://brainly.com/question/29752591
#SPJ4

The AP Exam uses the following format to insert an item to a list and to generate a random integer from a to b, including a and b. INSERT (aList, i, value) RANDOM(a, b) Given the following code segment, how can you best describe its behavior? i 1 FOR EACH X IN list { REMOVE(list, i) random - RANDOM(1, LENGTH(list)) INSERT(list, random, x) i + i + 1 } O This code replaces everything in the list with random numbers. O This code shuffles the order of the numbers in the list by removing them and inserting them back in a random place. O This code removes all of the numbers in the list and inserts random numbers in random places in the list. O This code errors by trying to access an element at an index greater than the length of the list.

Answers

Answer: This code shuffles the order of the numbers in the list by removing them and inserting them back in a random place.

Explanation: Here's how the code works:

The i variable is initialized to 1. This variable keeps track of the index of the element in the list being processed.
The code uses a for loop to iterate over each element x in the list.
In each iteration, the code calls the REMOVE function to remove the current element at index i from the list.
The code then generates a random number between 1 and the length of the list (inclusive) using the RANDOM function, and assigns it to the random variable.
The code calls the INSERT function to insert the removed element x back into the list at index random.
The code increments the value of i by 1.
The process repeats until all elements have been processed and shuffled.

As a result, the original order of the elements in the list is changed and the elements are randomly reordered.


Select the correct answer.
Which statement is true of both compilers and interpreters?
OA. They are software programs that translate programs in a low-level language to a high-level language
OB.
They are software programs that translate programs written in one high-level language to an equivalent program in another
high-level language
They are software programs that translate programs in a high-level language to machine language
They are software programs that translate programs written in machine language to an equivalent program in an assembly
language
O C.
D.

Answers

They are software programs that translate programs in a high-level language to machine language.

When an up counter accumulated value equals the preset value, the counter will:a. reset itselfb. stop countingc. continue to countd. continue to count but go into an overflow condition as soon as the accumulated value exceeds the preset value

Answers

The counter will start counting once the cumulative value of an up counter reaches the predetermined threshold.

Whether switching from false to true, the accumulated value is increased. It is also retained when the instruction is false or a power cycle takes place.

The CTU is an instruction that tracks the transition from false to true. The cumulative value is increased by one count when this transition occurs.

The RES instruction resets a CTU accumulation.

The overflow (OV) bit will be true if the accumulation value exceeds the maximum range.

The count up, count down, and reset instructions are covered in this section. Counters play a crucial role in implementing ladder logic. Values are indexed, incremented, or decremented using counters.

Specifies the threshold that must be met by the counter in order for the controller to set the done bit.

Learn more about Counter here:

https://brainly.com/question/19260682

#SPJ4

when you copy and paste a formula to a new location, the formula's relative references do not change.

Answers

Yes, that is correct. When a formula with relative cell references is copied and pasted to a new location, the references within the formula will adjust relative to the new location.

What exactly is a cell reference?

A cell reference in a spreadsheet refers to the location of a cell on the worksheet, specified by its column letter and row number. For example, in the cell reference "A1", "A" refers to the column and "1" refers to the row. Another example would be "B3" which would refer to the cell located in the 2nd column, 3rd row.

Cell references can be used in formulas and functions to refer to the contents of a specific cell, or a range of cells. For example, the formula "=SUM(A1:B3)" would sum the contents of all the cells in the range from A1 to B3.

To learn more cell reference, visit: about https://brainly.com/question/28435984

#SPJ4

a is malicious code that attaches itself to a host program and is activated when the program is ran.

Answers

This type of code is dangerous because it can be used to access, modify, or delete sensitive information, or to install malware or other malicious files on the affected computer.

What is malware?

Malware is a type of malicious software designed to gain access to or damage computer systems without the user's knowledge or permission. It can be used to steal private information, disrupt network operations, or even destroy hardware or software. Malware can be spread through email attachments, downloads, removable storage devices, and even websites. It is important to ensure the security of your system by regularly running anti-virus software and being vigilant about what links you click and files you download.

Malware such as viruses, worms, trojans, and other malicious programs can cause damage to systems and networks.

To learn more about malware
https://brainly.com/question/399317
#SPJ4

strrates is a string with delimited list of numbers this list can be arbitrary length. The pattern of this Rate. ..," Price 1,1 "," Raten"," Price,n.4L.. LockPeriodi " ;" Rate;"," Pricem, Raten ective of the Program is to transform this string into the following two-dimensional matrix and list is: "," Pricem,','' :L" LockPeriodm";" The Obj display it as an html page. So the output should look like this" Lockm Rate Rate2 Rate3 Lockı Price1,1 Price1,2 Price1,3 Lock2 Price2,1 Price2,2 Price2,3 Lock3 Price3,1 Price3,2 Price3,3 Pricem,1 Pricem,2 Pricem,3 Pricem,n Pricez,n Price3, Price1,n Raten Here is an example: If the input value to program is StrRates "5 then the function would print the following output ejoess, 101,6 0,10200,5 0,99,5.5,100,6.0,101Qo 20 2 5.0 5.5 6.0 100 101, 102 100 101

Answers

Very high scores must also be adjusted lower during normalization for the sake of conformity.

Scale the provided scores to a linear scale from 0 to 100 in order to get the normalized scores' average. Then, normalize each score between 0 and 100 using the highest score among the ones offered. To calculate the normalized score average, use mean. Examine the set of data. If you presume that scores should fit under a normal curve, it makes logical to "normalize" scores in order to make them do so. Very high scores must also be adjusted lower during normalization for the sake of conformity. In either scenario, some data are distorted and information is lost. Each final Z-position scores after normalization may be used to determine how far above or below 0 each student receives in grades.

Learn more about Normalize here:

https://brainly.com/question/29842856

#SPJ4

lapton battery fully charged but laptop shuts down when unplugged. got a new battery, same thing happens

Answers

The battery may have failed, which is the most obvious cause of a laptop shutting down quickly after being unplugged from the power source.

Why does my laptop constantly shutting off despite having a full charge?

A bad power adapter, broken outlets, or bad batteries are all possible causes of your laptop dying while it is plugged in. This response can also be brought on by more serious internal issues, such as broken motherboards, HDDs, SSDs, or RAM.

How much should my laptop charge before I stop?

The recommended course of action is to keep the battery level between 40% and 80%. Check to see if your laptop's cooling fan is functioning correctly and that it doesn't grow too hot. Your laptop battery cannot "overcharge" and endanger itself as a result.

To know more about laptop visit:-

https://brainly.com/question/27782123

#SPJ4

in the following code, identify the value of children.length property if article is the element node.

the u.s. constitution

preamble


we the people of the united states, in order to form a
more perfect union ...


1 4 2 3

Answers

If article is the element node, the value of the children length property is 3.

What is element node?A node is a representation of a computing or physical resource that hosts, controls, or communicates with other computing or physical resources. Nodes are active structural components that execute stored and processed technological objects, such as artefacts, and perform technological behaviour. Paths can join nodes together. A network node is a device that connects other network devices, such as switches, routers, and printers, so that data can be received and sent from one endpoint to the other. various network node types. The fundamental components of computer networking are nodes and connections. Data communication equipment (DCE) like a modem, hub, or switch, as well as data terminal equipment (DTE) like two or more PCs and printers, can all be considered network nodes.

To learn more about element node, refer to:

https://brainly.com/question/28902467

#SPJ4

Have to make a self-portrait but am done with the portrait but need animations such as blinking, color change, smiling, etc. Need at least 3 animations. Can anyone help me ASAP? It doesn't have to be hard, it can also be like simple codes. Using CodeHs btw.

function start(){


var face = new Circle(130);
face.setPosition(x , y - 80);
face.setColor("#f1c27d");
add(face);

var leftEye = new Circle(30)
leftEye.setPosition(x - 50, y - 120);
leftEye.setColor("white");
add(leftEye);

var RightEye = new Circle(30)
RightEye.setPosition(x + 50, y - 120);
RightEye.setColor("white");
add(RightEye);

var RighteyeBalls = new Circle(15)
RighteyeBalls.setPosition(x + 50, y - 120);
RighteyeBalls.setColor("#603101");
add(RighteyeBalls);

var LefteyeBalls = new Circle(15)
LefteyeBalls.setPosition(x - 50, y - 120);
LefteyeBalls.setColor("#603101");
add(LefteyeBalls);

var hair = new Oval(250,100);
hair.setPosition(x, y - 200);
hair.setColor("#7B3F00");
add(hair);

var neck = new Rectangle(50, 50);
neck.setPosition(x - 25, y + 40);
neck.setColor("#f1c27d");
add(neck);

var body = new Rectangle(260,260);
body.setPosition(x - 130, y + 80);
body.setColor("#15ACA5");
add(body);

var leftshoulder = new Rectangle(70, 70);
leftshoulder .setPosition(x - 200,y + 80);
leftshoulder.setColor("#15ACA5");
add(leftshoulder);

var rightshoulder = new Rectangle(70, 70);
rightshoulder .setPosition(x + 130,y + 80);
rightshoulder.setColor("#15ACA5");
add(rightshoulder);

var rightarm = new Rectangle(70, 90);
rightarm .setPosition(x + 130,y + 150);
rightarm.setColor("#f1c27d");
add(rightarm);

var leftarm = new Rectangle(70, 90);
leftarm .setPosition(x - 200,y + 150);
leftarm.setColor("#f1c27d");
add(leftarm);




}
var x = getWidth()/ 2
var y = getHeight()/ 2


Answers

I've added 3 animation to your code: mouth moving up/down, eyes looking left/right, and shirt changing colors.

I've use only what's given in the CodeHS doc (If/Else, Oval, and Timers). Could've made something better without the restriction, since Javascript doesn't use setTimer/stopTimer but use setInterval. Oh well, this one is simple enough :)

I've moved some code around and rename a couple variables, so it's best to copy+paste the new code.

//Will be called in other function

var x = getWidth()/ 2;

var y = getHeight()/ 2;

var mouth = new Oval(100, 50);

var rightEyeBall = new Circle(15);

var leftEyeBall = new Circle(15);

var body = new Rectangle(260,260);

function start(){

   var face = new Circle(130);

   face.setPosition(x , y - 80);

   face.setColor("#f1c27d");

   add(face);

   

   var leftEye = new Circle(30)

   leftEye.setPosition(x - 50, y - 120);

   leftEye.setColor("white");

   add(leftEye);

   

   var rightEye = new Circle(30)

   rightEye.setPosition(x + 50, y - 120);

   rightEye.setColor("white");

   add(rightEye);

   

   rightEyeBall.setPosition(x + 50, y - 120);

   rightEyeBall.setColor("#603101");

   add(rightEyeBall);

   

   leftEyeBall.setPosition(x - 50, y - 120);

   leftEyeBall.setColor("#603101");

   add(leftEyeBall);

   

   var hair = new Oval(250,100);

   hair.setPosition(x, y - 200);

   hair.setColor("#7B3F00");

   add(hair);

   

   var neck = new Rectangle(50, 50);

   neck.setPosition(x - 25, y + 40);

   neck.setColor("#f1c27d");

   add(neck);

   

   body.setPosition(x - 130, y + 80);

   body.setColor("#15ACA5");

   add(body);

   

   var leftshoulder = new Rectangle(70, 70);

   leftshoulder .setPosition(x - 200,y + 80);

   leftshoulder.setColor("#15ACA5");

   add(leftshoulder);

   

   var rightshoulder = new Rectangle(70, 70);

   rightshoulder .setPosition(x + 130,y + 80);

   rightshoulder.setColor("#15ACA5");

   add(rightshoulder);

   

   var rightarm = new Rectangle(70, 90);

   rightarm .setPosition(x + 130,y + 150);

   rightarm.setColor("#f1c27d");

   add(rightarm);

   

   var leftarm = new Rectangle(70, 90);

   leftarm .setPosition(x - 200,y + 150);

   leftarm.setColor("#f1c27d");

   add(leftarm);

   

   //Added Mouth

   mouth.setPosition(x, y);

   mouth.setColor("red");

   add(mouth);

   

   //Animation: timer is set to check and alternate directions.

   //Mouth animation

   setTimer(talk, 1000);//1000=1seconds

   //Eyeball animation

   setTimer(look, 1000);

   //Change body color

   setTimer(randomColor, 100);

}

function talk(){//alternates between up and down

   if(mouth.getY() >= y-10){//check if rightEyeBall has moved passed 10px

       stopTimer(mouthDown);

       setTimer(mouthUp, 50);//50=50ms. decrease to speed up.

   } else{

       stopTimer(mouthUp);

       setTimer(mouthDown, 50);

   }

   

}

function mouthDown(){

   mouth.move(0,1);//move 1px down

}

function mouthUp(){

   mouth.move(0,-1);//move 1px up

}

function look(){

   if(rightEyeBall.getX() <= x +55){//check if rightEyeBall has moved passed 5px offset

       stopTimer(lookLeft);

       setTimer(lookRight, 50);

   } else {//move it back

       stopTimer(lookRight);

       setTimer(lookLeft, 50);

   }

}

function lookLeft(){

   rightEyeBall.move(-1,0);

   leftEyeBall.move(-1,0);

}

function lookRight(){

   rightEyeBall.move(1,0);

   leftEyeBall.move(1,0);

}

function randomColor(){

   body.setColor(Randomizer.nextColor());

}

A teacher wants to know if her students are doing homework, so she randomlyselects rows two and five and then calls on every students in row two and everystudents in row five to present the solutions to homework problems to the class.What type of sampling was used?a) Convenience samplingb) Cluster samplingc) Stratified Samplingd) Simple random sampling

Answers

C) Stratified Sampling type of sampling was used.

What type of sampling was used?Stratified sampling is a method of sampling that involves dividing a population into smaller groups (strata) which are then randomly sampled.In this case, the teacher has divided the population of students into two groups (rows two and five) and then randomly selected those rows for her sample. By randomly selecting the rows, the teacher is ensuring that all students have an equal chance of being included in the sample.Stratified sampling is often used in educational research to ensure that a representative sample is taken from each group of students.For example, if the teacher wanted to compare the performance of male and female students, she could use stratified sampling to ensure that an equal number of male and female students are included in the sample.Stratified sampling can also be used to ensure that a sample taken is representative of the demographic makeup of the population.For example, if the school had a population that was mostly made up of African American students, the teacher could use stratified sampling to ensure that the sample reflects this demographic makeup.

To learn more about Stratified Sampling refer to:

https://brainly.com/question/20544692

#SPJ4

Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?a) modulatorb) repeaterc) RF receiverd) cell transmitter

Answers

Remember that probability is defined as the ratio of the number of required outcomes to the total number of outcomes.

As a result, the probability is defined as the ratio of the needed outcome to the potential outcome. In the first section above, the number of outcomes that must be at least one is equal to the number of outcomes that could be possible, which is three. While in the second section, there are n alternative outcomes, making o the number. Remember that probability is defined as the ratio of the number of required outcomes to the total number of outcomes. The probability that a transmitter will really catch the signal it is sending is given as. The probability will be displayed as when there are n transmitters.

Learn more about The Probability here:

https://brainly.com/question/15692537

#SPJ4

When implementing group ABA programs, it is important to monitor both processes and __________________.
A. outcomes
B. procedures
C. purposes

Answers

Monitoring both procedures and outcomes is crucial when implementing group ABA programmes into practise.

Making a programme work is what programme implementing is all about. It covers the who, what, where, and how of a program's setup and operation. Early childhood programmes operate in environments that are complicated, dispersed, and frequently subject to changes in the political and economic landscapes. All of these factors can either support or undermine a program's capacity to produce outcomes. In order to set projects up for success, effective execution is more than just a contributing aspect. According to research, results are greatly influenced by the effectiveness of implementation. A program's objectives are unlikely to be met or its effects will be less substantial if it is badly or even modestly executed.

Success is more likely with high-quality execution.

Learn more about Implementing here:

https://brainly.com/question/30081664

#SPJ4

Assume that you work as a network administrator. A colleague approaches you with an issue that he is not able to access the company's services on the server. After troubleshooting, you identify the firewall as a possible cause for the issue. To confirm this, you need to verify the firewall configuration in your colleague's computer.
Which of the following cmdlets will you use for this purpose?
a. Get-NetFirewallProfile
b. Set-NetFirewallRule
c. Get-NetFirewallRule
d. Set-NetFirewallProfile

Answers

To confirm this, you need to verify the firewall configuration in your colleague's computer . Get-NetFirewallRule, cmdlets will you use for this purpose.

Option C is correct.

How does troubleshooting work?

Troubleshooting is a methodical approach to problem-solving that is frequently used to identify and resolve issues with sophisticated software systems, electronics, computers, and machinery. The majority of techniques for troubleshooting begin by gathering information about the issue, such as an undesirable behavior or an intended capability deficit.

After identifying the issue and determining how to replicate it, the next step is to remove any unnecessary components to determine whether the issue persists. Using this, problems caused by third-party components and incompatibilities between components can be identified.

In most cases, the goal of troubleshooting techniques is to narrow a problem down so that it can be looked into. The main goal is to figure out what's wrong and test easy fixes like restarting the system and turning the power on and off.

Learn more about troubleshooting:

brainly.com/question/28508198

#SPJ4

Which of the following is best described as a program loaded into memory that has no user interface but communicates with other programs?a. Processb. Taskc. Serviced. Application

Answers

c. Service

A service is a program loaded into memory that has no user interface, but communicates with other programs. Services are typically used to perform background tasks or provide functionality to other programs. They are often used to manage system resources, such as network connections or hardware devices. Examples of services include the Windows Event Log service, the Print Spooler service, and the Task Scheduler service.

A process is a program that is currently running in memory and can have a user interface.

A task is a set of instructions that tells the operating system what needs to be done, it can be a process or a service.

An application is a program that runs on a computer and has a user interface.

what is a network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed?

Answers

Replay Attack is a network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.

What is a Replay Attack?

A replay attack also known as Repeat or playback attack that takes place when a hacker listens a secure network connection, intercepts it, and then purposefully delays or resends it to trick the recipient. Such attacks poses several risks because a hacker can easily decode or decrypt a communication after grabbing it from the network. By simply transmitting the entire thing again, the attack could be successful.

Having a unique password for each transaction that is only ever used once and then forgotten is a way to avoid becoming a victim. This guarantees that the encryption code has expired and is no longer functional even if the communication is recorded and delivered again by an attacker.

To know more about Cyber Attacks, visit

https://brainly.com/question/29971706

#SPJ4

The following pseudocode describes how a bookstore computes the price of an order from the total price and the number of the books that were ordered. Step 1: read the total book price and the number of books. Step 2: Compute the tax (7.5% of the total book price). Step 3: Compute the shipping charge ($2 per book). Step 4: The price of the order is the sum of the total book price, the tax and the shipping charge. Step 5: Print the price of the order. Translate this psuedocode into Javascript.

Answers

Below is one possible way to translate the pseudocode into JavaScript:

// Step 1: read the total book price and the number of books

var totalBookPrice = prompt("Enter the total book price:");

var numBooks = prompt("Enter the number of books:");

// Step 2: Compute the tax (7.5% of the total book price)

var tax = (totalBookPrice * 0.075);

// Step 3: Compute the shipping charge ($2 per book)

var shippingCharge = (numBooks * 2);

// Step 4: The price of the order is the sum of the total book price, the tax and the shipping charge

var priceOfOrder = totalBookPrice + tax + shippingCharge;

// Step 5: Print the price of the order

console.log("The price of the order is: $" + priceOfOrder);

What is the pseudocode about?

This code is a JavaScript implementation of the pseudocode provided. It takes the total book price and the number of books as input, then calculates the price of the order by adding the total book price, the tax, and the shipping charge.

The first two lines of code are using the JavaScript function prompt() to read the total book price and the number of books from the user.

In the third line, the tax is being computed by multiplying the total book price by 0.075, which is equivalent to 7.5%

Please note that this is one of the possible implementations of this pseudocode, and there are other ways to implement it, depending on the context and the requirement.

Learn more about  pseudocode  from

https://brainly.com/question/24953880

#SPJ1

You created a bar chart with the bars for the products and the colors for the salesperson. If you click Switch Row Column, what will happen?
You are correct!
The bars will change to salespeople, and the colors will change to products.

Answers

The colors will become the merchandise, and the bars will become the salespeople.

With the bars representing the products and the colors representing the salesperson, you made a bar chart. The bars' axis will shift to represent salespeople, and the colors will represent products, if you click the switch row column button. A bar chart, often referred to as a bar graph, is a type of chart or graph that uses rectangular bars with heights or lengths appropriate to the values they represent to display categorical data. You can plot the bars either horizontally or vertically. A column chart is another name for a vertical bar graph.

Learn more about merchandise here-

https://brainly.com/question/28465110

#SPJ4

Other Questions
Your instructor asks you to look into your microscope to see a prokaryotic cell. You will be looking for a cell that: A) has a nucleus B) has a membrane C)makes up most of the tissues of your body D) is much larger than most cells in your body E) does not use DNA to code genetic information What happened in the colonies in 1774?. How do you find the acceleration of a ball down a ramp?. Which of the following statements about the impact of a company's competitive efforts in a region on its regional market share and number of branded pairs sold is false? A company's sales/market share outcomes in a region's Wholesale segment are negatively impacted if its rebate offer is below the regional average, and this impact becomes progressively larger as the size of the percentage below the regional-average mail-in rebate offer increases. The more a company's S/Q rating in a region is above the all-company average, the bigger is the company's resulting competitive advantage and the bigger is the positive impact on the company's pairs sold and market share in the region. Companies whose delivery times are in a region are shorter than the all-company average have a competitive advantage in attracting footwear retailers to stock their brand. A company's sales/market share outcomes in a region's Wholesale Segment are positively impacted if the amount of footwear retailer support it provides is above the all-company average in a region (such levels of support also help attract more footwear retailers to stock its brand in the upcoming year). Achieving a competitive advantage on brand advertising in a given region requires a company to boost its brand advertising expenditures to an amount that exceeds the expenditures of any other company. UUSSO the idea that sex differences in mate preferences and mating behaviour are adaptations to gender roles.People are drawn to those who are of a similar age, education, social class, ethnic group membership, religion, attitudes, interests, and temperamentChoose matching termO Social (Holland's Personality Types)O Parental investment theoryO financial stabilityO Social Role Theory If PQRS is a rectangle, ST = 12, and mzPRS = 23, find each measure.SQ = PT = measurement of angle QPR = Which of the following nonverbal behaviors is offered by your authors to get other members to like you?- don't smile- text while others are- talking- scowl- shout- NONE OF THE ANSWERS ARE CORRECT One cubic foot of a chemical weighs 60 pounds. How many pounds of the chemical can a container with the dimensions shown hold? What did Mr Shiftlet want?. Which definition of channel is used in each sentence?Type the number of thecorrect definition.He learned how to channel his anger.The diplomat served as achannel between the twopresidents.721 review the information to the right. read the introduction and examine the photograph of a chromosome. list three chromosome features used in chromosome identification: What is the result of isolating y^2 in the equation below? 4x^2 + 25y^2= 100 1. Convert 4.52 x 10 26 atoms of gold to moles of gold. Use the prewriting and writing techniques you have just reviewed to create an outline for theessay you will write for Unit 1:"What does it take to succeed in an Internet-based college course?"Remember that most writers use roman numerals, numbers, letters, and indenting to show howideas are related. You can create an outline by hand or use a computer, which will give yougreater flexibility to add ideas and move them around.Within an outline, a common numbering/lettering order is:I.A.1.a.b. question to make the new government viable, the first congress of the united states did all of the following exceptgrant subsidies to encourage industrial development A cell phone plan cot $ 22. 70 per month for 600 minute of talk time. It cot an additional $ 0. 05 per minute for each minute over 600 minute. To get e-mail acce, it cot 10% of the price for 600 minute of talk time. Your bill, which include e-mail, i the ame each month for 8 month. The total cot for all 8 month i $ 227. 76. Write and olve an equation to find the number of minute of talk time you ue each month Charlie and Hayden are standing outside. Charlie is 64 inches tall and casts a shadow of 30 inches. If Hayden is 68 inches tall, approximately how long is his shadow? 28 inches 32 inches 145 inches 31 inches One way to avoid sending an unprofessional email to an instructor is to use ______.A. emoticonsB. proper grammarC. colorful fontsD. slang which statements describe client care accountability and responsibility according to the national council of state boards of nursing (ncsbn) delegation model when a registered nurse (rn) has delegated ambulating a client who is 2-day postoperative hip replacement to the licensed practical nurse (lpn)? select all that the nurse is providing instructions to a client taking ethambutol about the medication. the nurse instructs the client to contact the primary health care provider immediately if which occurs?