Write, in your own words, a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.

Answers

Answer 1

Answer:

Running queries in SQL or structured query language interacts with a relational database. It is used to create new databases and tables, read the content of the database tables, update and also delete the content.

Microsoft Access is a database software but Excel is a spreadsheet application.

Explanation:

Access databases hold large datasets that can be accessed from other platforms and generate automatic query while datasets in Excel are limited but it has comprehensive statistical tools for data analysis.


Related Questions

JAVA...Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
CODE BELOW
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
}
public static void main (String [] args) {
char startingLetter;
startingLetter = 'z';
/* Your solution goes here */
}
}

Answers

Answer:

RecursiveCalls.backwardsAlphabet(startingLetter);

Explanation:

The statement that is needed is a single-line statement. Since the class RecursiveCalls is already in the same file we can simply use that class and call its function without making a new class object. Once we call that class' function we simply pass the variable startingLetter (which is already provided) as the sole parameter for the function in order for it to run and use the letter 'z' as the starting point.

       RecursiveCalls.backwardsAlphabet(startingLetter);

1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
attackware D. malware Answer:
2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,
worms, and robots D.worms, system kits, and loggerware Answer:
3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving system
functions D. producing fake applications Answer:
4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C.robots D.
phishing Answer:
5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.
can work jointly with other malware types D. can always be stopped by anti-malware software Answer:
6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using password
protection C. using old versions of software D. using encryption on sensitive files Answer:
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering
personal information C. give an attacker full control over a system D. all of the above Answer: -
8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.
maladapted and software D. malicious and software Answer:
9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damaged
hardware C. emails/attachments D.updated software Answer:
10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas in
one system C. malware that deactivates after a period of time D. malware that infects smartphones and tablets
Answer:

Answers

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware

The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

Answers

Answer:

application demand model

Explanation:

A free-frame list Select one: a. is a set of all frames that are used for stack and heap memory. b. is a set of all frames that are currently unallocated to any process. c. is a set of all frames that are filled with all zeros. d. is a set of all frames that are currently being shared by at least two processes.

Answers

Answer:

b. is a set of all frames that are currently unallocated to any process

Explanation:

The free frame list is the list that used for all kind of the frames that presently non-allocated to any kind or process

Therefore as per the given situation, the correct option is b as it fits to the current situation

Hence, all the other options are wrong

So, only option b is correct

The same is to be considered

Answer:

b. is a set of all frames that are currently unallocated to any process.

explain the main components of a computer system​

Answers

Answer:

A motherboard.

A Central Processing Unit (CPU)

A Graphics Processing Unit (GPU), also known as a video card.

Random Access Memory (RAM), also known as volatile memory.

Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)

Explanation:

They all work together to create a system

Prompt
Using complete sentences post a detailed response to the following.
Have you ever tried to learn a new language or do you have friends who've had that experience? What are some of the
steps you would take to learn a new language, and what are some challenges that might arise? What are some things that
can help make the process easier?

Answers

Have you ever tried to learn a new language or do you have friends who've had that experience?

Yes, I tried to learn Python and I even managed to do two Discord bots which are (somewhat) functional, but I'm far to say that I've managed to lean the language completly. There are lots of things to learn on a language as Python.

I also leant PHP on my own and managed to do a website (somehow) functional.

What are some of the  steps you would take to learn a new language, and what are some challenges that might arise?

The first steps in learning any computer language is learning the syntax. If you manage to do that, with the experience you gained from previous projects/languages you might be able to create something working. At times you might feel down if the project doesn't work as expected.

What are some things that  can help make the process easier?

Video tutorials, experiments and searching questions and problems on Google is a very important resource.

One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files

Answers

C using old versions of software

What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer among the given options to this question is:

Knowledge of HTML is not required.

Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”)  editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”)  automatically inserts the HTML for the form and button on a website page.

While other options are not correct because:

Using the WYSIWYG (“what you see is what you get”)  editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”)   website templates are mostly used and modified using WYSIWYG editor.

Answer:

(C):Knowledge of HTML is not required.

hello hello . please help me​

Answers

Answer:

#include <iostream>  

using namespace std;  

int main()  {  

 int num, check=0;  

 for(int num = 1; num<=100;num++){

for(int i = 2; i <= num/2; i++)  {

     if(num % i == 0)   {  

         check=1;  

         break;         }     }  

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

 return 0;  

}

Explanation:

This line declares num as integer which represents digits 1 to 100.

A check variable is declared as integer and initialized to 0

 int num, m=0, check=0;  

This for loop iterates from 1 to 100

 for(int num = 1; num<=100;num++){

This iterates from 2 to half of current digit

for(int i = 2; i <= num/2; i++)  {

This checks for possible divisors

     if(num % i == 0)   {  

If found, the check variable is updated to 1

         check=1;  

And the loop is terminated

         break;         }     }  

The following if statement prints the prime numbers

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

Write a program that calculates the average of N integers. The program should prompt the
user to enter the value for N and then afterward must enter all N numbers. If the user enters a
negative value for N, then an exception should be thrown (and caught) with the message “ N
must be positive.” If there is any exception as the user is entering the N numbers, an error
message should be displayed, and the user prompted to enter the number again.

Answers

Answer:

def Average(num):

   if num == 0:

       return 0

   val = 0

   trueNum = num

   for i in range(0, num):

       try:

           val += int(input("Enter value (%d out of %d): " % (i+1,num)))

       except Exception as e:

           print ("Error processing value. Non integer detected.")

           try:

               val += int(input("Enter value (%d out of %d): " % (i+1,num)))

           except Exception as e:

               print ("Error processing value. Non integer detected.")

               print ("OMITTING value from average.")

               trueNum -= 1

   return val/trueNum

def main():

   try:

       num = int(input("Enter a value N for amount of items: "))

       if num < 0:

           raise(ValueError)

   except ValueError:

       print ("N must be positive integer.")

       exit(1)

   print("Average: ", Average(num))

   exit(0)

if __name__ == "__main__":

   main()

Explanation:

This program is written in Python to collect some integer value from the user as an upper bound of integers to be input for an average.  Using this upper bound, the program checks to validate it is indeed an integer.  If it not an integer, then the program alerts the user and terminates.  If it is a user, the Average function is called to begin calculation.  Inside the Average function, the user is prompted for an integer value repeatedly up until the upper bound.  Using the sum of these values, the program calculates the average.  If the user inputs a non integer value, the program will alert the user that the value must be an integer and ask again.  If the user again inputs a non integer value, that iteration will be omitted from the final average.  The program this prints the calculated average to the user.

Cheers.

In C 11, the ________ tells the compiler to determine the variable's data type from the initialization value.

Answers

Answer:

auto key word

Explanation:

the auto keyword in c++11 can be regarded as one of the features of

“Type Inference” . It should be noted that in In C ++11, the auto key word tells the compiler to determine the variable's data type from the initialization value.

Learning Target: Students will work on final project.
You have leamed about video game industry and acquired basic skills to make basic
video games in this class so far. It is time to update your resume and cover letter.
Re-visit your assignments from 9/28-9/29 in this class. You can find that at your
submission in google classroom for this class for the dates mentioned. Type your
resume and cover letter using google docs or MS word professionally. First do
research to find a job opening in a real company. Craft your resume and cover letter
as if you are applying for the job listed. List game projects, coding skills etc. that
could benefit you in finding his job.
1. Check-in/Exit Ticket
2. Resume and Cover Letter

Answers

Answer:

I don't get this question

Becky's mom is a nurse and is required to wear specific clothing to work. This clothing is called

a uniform
business casual
casual
formal business attire

Answers

the answer is uniform!

hope this helps!!

Suppose that the LC-3 instruction LD R1, DATA is located at x3100 in memory and the label DATA is located at x 310F. The machine code (in hex) for the above instruction is

Answers

Answer:

The machine code is located at x210F.

Explanation:

The DATA is located at x3100 while the DATA label is located at the x310F (in hex) in the memory which is F address away (8 bits) from the DATA itself. The machine code location is relative to the address of the DATA label.

If A = 5 and B = 10, what is A * B equal to?

Answers

Answer:

50

Explanation:

5 times 10 equals 50

Answer:

50

Explanation:

If A=5 and B= 10 you would do 5 times 10 which equals 50

Write a recursive function that accepts two arguments into the parameters x and y. The function should return the value of x times y. Hint: multiplication can be performed as repeated addition. Test your recursive function by prompting the user to enter values for x and y and then displaying the result. Your function should be able to handle multiplication of negative values.

Answers

Answer:

In Python:

def times(x,y):

     if y<0:

           return -1*times(x,y*-1)

     if y == 1:

           return x

     return x + times(x,y-1)

x = int(input("x: "))

y = int(input("y: "))

print(times(x,y))

Explanation:

I answered the question using Python3

This defines the function

def times(x,y):

This checks for negative values

     if y<0:

           return -1*times(x,y*-1)

This is the base case where y = 1

     if y == 1:

If true, the value of x is returned

           return x

This returns the recursion and it is repeated until the base case is achieved

     return x + times(x,y-1)

This prompts user for x value

x = int(input("x: "))

This prompts user for y value

y = int(input("y: "))

This calls the recursion and also prints the result

print(times(x,y))

What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g

Answers

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
numPtr1 = 44, numPtr2 = 99
#include
#include
int main(void) {
int* numPtr1 = NULL;
int* numPtr2 = NULL;
/* Your solution goes here */
*numPtr1 = 44;
*numPtr2 = 99;
printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);
free(numPtr1);
free(numPtr2);
return 0;
}

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

int main(void) {

   int* numPtr1 = NULL;

   int* numPtr2 = NULL;

   /* Your solution goes here */

   numPtr1 = (int *) malloc(10);

   numPtr2 = (int *) malloc(20);

   *numPtr1 = 44;

   *numPtr2 = 99;

   printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);

   free(numPtr1);

   free(numPtr2);

   return 0;

}

Explanation:

The C library malloc function is used to assign memory locations (in bytes) to variables. It accepts the size parameter and returns a pointer to the specified variable location.

The two malloc statements above assign two memory locations 10 and 20 to the numPtr1 and numPtr2 integer variables respectively.

If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/Algorithm to search the heavy orange, in how many steps would you be able to find it out?

Answers

Answer:

#include <iostream>

using namespace std;

void Search_heavy_orange(int arr[], int l, int r, int x)

{

int count = 0, m = 0;

while (l <= r) {

 m = l + (r - l) / 2;

 // Check if x is present at mid

 if (arr[m] == x) {

  count++;

 }

 // If x greater, ignore left half

 if (arr[m] < x) {

  l = m + 1;

  count++;

   

 }

 

 // If x is smaller, ignore right half

 else {

  r = m - 1;

  count++;

 }

}

cout << "............For Worst Case......." << endl;

cout << "Orange with heavy weight is present at index " << m << endl;

cout << "Total number of step performed : " << count << endl;

}

int main()

{

// Assuming each orange is 100 gm and the weight of heavy

// orange is 150 gm

int orange_weight[128];

for (int i = 0; i < 127; i++) {

 orange_weight[i] = 100;

}

// At worst case the heavy orange should be at last position

// inside the basket : 127

orange_weight[127] = 150;

// We will pass array , start index , last index and the search element

// as the parameters in the function Search_heavy_orange

Search_heavy_orange(orange_weight, 0, 127, 150);

return 0;

}

Explanation:

What is closed soruce nonproprietary hardware and software based on publicly known standards that allow third parties to create

Answers

Answer:

open system

Explanation:

An open system is a system that sets open-source standards and promotes the interoperability and portability standards between systems developing and running open-source programs.

An open-source application is a program in which its source code is readily available and free for public use and upgrade. Unlike closed-source, its users can add or update the features of the source code.

What kind of number is 36A

Answers

Rational
or compound what form are you looking for?

URGENT


You are an art director working for a feature film studio. Create a set for an interior scene of your choosing. Write a description of your scene to give to the principal production team. Include details that an art director would focus time and energy on. Include other production team members with whom you would collaborate. Your description should be at least 150 words.

Answers

Looks Like That’s Something You’d Have To Do On Your Own

Multiple Choice
Which method adds an element at the beginning of a deque?
appendleft
O insertleft
O popleft
addleft

Answers

Answer: appendleft

Explanation: Edge 2021

The method that adds an element for the information at the beginning of a deque is append left. Thus option (A) is correct.

What is an information?

An information refers to something that has the power to inform. At the most fundamental level information pertains to the interpretation of that which may be sensed.

The digital signals and other data use discrete signs or alogrithms to convey information, other phenomena and artifacts such as analog signals, poems, pictures, music or other sounds, and the electrical currents convey information in a more continuous form.

Information is not knowledge itself, but its interpretation is important. An Information can be in a raw form or in an structured form as data. The information available through a collection of data may be derived by analysis by expert analysts in their domain.

Learn more about information here:

brainly.com/question/27798920

#SPJ5

Choose the correct term to complete the sentence

The ____ function removes the element with an index of zero.

1)popleft
2)leftremove
3)leftpop

Answers

Answer:

popleft

Explanation:

Answer: pop left

Explanation: got it right on edgen

Describe one practical application of total internal reflection. ​

Answers

Answer:

The phenomenon of total internal reflection of light is used in many optical instruments like telescopes, microscopes, binoculars, spectroscopes, periscopes etc. The brilliance of a diamond is due to total internal reflection. Optical fibre works on the principle of total internal reflection.

Explanation:

thank me later but if it wrong. sorry

Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum speed (mph), average fuel consumption (mpg), etc. Create few objects to illustrate your desired cars.

Answers

Answer:

Answered below

Explanation:

This is written in Kotlin programming language.

//Creating the class Car. The primary //constructor declares car's properties which //are initialized when it's objects are created.

class Car(

val type: String,

val gear: String,

val maxSpeed: Double,

val avgFuelConsumption: Double)

//Creating several objects of car.

val sedan: Car = Car("sedan", "auto", 23.4, 500)

val jeep: Car = Car("jeep", "manual", 40, 350)

val mini: Car = Car("mini", auto, 26.7, 86, 234)

Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?

Answers

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

A part-time job performed while in high school must have the approval of your school counselor.
False
True

Answers

Answer:

False, it only needs approval of your parents/guardian

May I have brainliest please? :)

Answer:

False

Explanation:

i can't find my grandson someone help

Answers

Answer:

i'm right here

Explanation:

grandma

Answer:

were did u lose him.

Explanation:

Other Questions
Which set of coordinates is NOT a function?O {(5,5), (3, 9), (2, -1), (5, 8)}O {(2,5),(3,9),(4, -1), (5,9)}O {(-2,-5).(-3,5),(4,-5), (5,5)} QUESTION 4Read the excerpt from Into the Unknown by Stewart Ross.The Mov steamed south along the coast, crossed the equator in the afternoon, and reached the broad mouth of the Ogoou by evening. Chugging steadily upriver, over the next two days the steamer carried Kingsley between banks of overhanging forest to the small settlement of Lambarn, 130 miles from the sea. From here, she waited to catch a small stern-wheel steamer, the claireur, bound for Ndjol, ninety miles upstream, which she reached on June 23.Which text feature would best support the details in the excerpt?a map of the Ogoou Rivera photograph of Mary Kingsleya diagram of the Mov steamera chart of Mary Kingsleys travel dates As a bicycle is ridden west in a straight line with decreasing speed,the acceleration of the bicycle must be 12. Integral proteins are located Somebody told me to take this picture a little bit closer How many moles are there in 5.2x10^23 atoms of CO2? Help needed asapIf 0 You are picking out an outfit to wear for school. You have the option of wearing jeans, a pair of khakis, or a pair of shorts; a white shirt, a yellow shirt or an orange shirt; and a pair of tennis shoes, a pair of flip flops or a pair of dress shoes. How many different outfit combinations do you have? Which resource will NOT help you learn to perform car maintenance work on your own? A. Model car instructions B. Information found online C. Experienced car owners D. The owner's manual 8) a 20kg box is sliding across the ground. If the coefficient of friction is 0.5, how much friction will the box experience?A 490 NB 19.6 NC 98 ND 2 N Which two elements are most likely to have similar physical properties?A. copper and zincB. copper and silverC. cadmium and indiumD. gallium and cadmium Which of the following is the best explanation for the areas without vegetation? A. They are not populated by many people.B. They are located in deserts where there is little rain.C. They are located in areas where people prefer tending livestock to farmingD. They are located in areas that are heavily urbanized, where no farming occurs Hii finding the slope (there are 3 questions please answer them all) Which number is not in scientific notation? 3.2 102 15 1020 8 1013 1.42 109 taylosky pls answer this If an object such as a toaster is unplugged, should it be under the category of mechanical energy or electrical energy? Read and choose the correct word for the blank that matches the image. Woman practicing gymnastics on two strong chairs in a gym Practico deportes con sillas ________. duras blandas rojas rosadas GIVING BRAINLIST Use the number line to answer the question. Each tick represents 1 unit.Which of the following points represents the largest number?PMJH Solve this system of equations using elimination. Write your answer as an ordered pair,5x-2y = 104x + 2y = 8 we need to eat our lungs