By adding the GROUP BY clause to a query, the following statement(s) is/are true. (Check all that apply)
The query is changed from rows to groups
The keyword DISTINCT must be used
The WHERE clause is replaced by the HAVING clause
The query must also have a HAVING clause

Answers

Answer 1

The correct response is a) The query is changed from rows to groups. You can see the unique number value that each row is assigned on the left side of the screen.

A row—also known as a tuple—represents a single, implicitly organized data item in a table in the context of a relational database. A database table can be conceptualized as being made up of rows and columns. Every row in a table has the same structure and represents a group of connected data. For instance, each row would represent a single company in a table that represents businesses. Columns may display information about the company such as its name, street address, whether it is publicly traded, its VAT number, etc. Each row would link one employee with one department in a table that shows the relationships between employees and departments. A row must be regarded as delivering a succession of data values, one in each column of the table, in order for the implicit structure of a row and the meaning of the data values in a row to make sense. Following that, the row is read as a relvar made up of a collection of tuples, each of which contains the name of the pertinent column and the value that this row supplies for that column.

Learn more about rows here

https://brainly.com/question/22903171

#SPJ4


Related Questions

We have removed
A
balls from a box that contained
N
balls and then put
B
new balls into that box. How many balls does the box contain now?
Constraints
All values in input are integers.
Input
Input is given from Standard Input in the following format: n a b
Output
Print the answer as an integer.

Answers

There were \(N\) balls but we took \(A\) balls out, so there are now \(N-A\) balls. We add \(B\) balls and now we have \(N-A+B\) balls.

The program that computes this (I will use python as language has not been specified is the following):

n, a, b = int(input()), int(input()), int(input())

print(f"There are {n-a+b} balls in the box")

# Hope this helps

what is the command for basic router configuration?

Answers

Answer:

Step 1 configure terminal Example: Router> enable Router# configure terminal

Step 2 hostname name Example: Router(config)# hostname Router

Step 3 enable secret password Example: Router(config)# enable secret cr1ny5ho

Step 4 no ip domain-lookup Example: Router(config)# no ip domain-lookup

Explanation:

working with the tkinter(python) library



make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?

Answers

To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.

How can I make a tkinter window always appear on top of other windows?

By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.

This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.

Read more about python

brainly.com/question/26497128

#SPJ1

Does the fact ¬Spouse(George,Laura) follow from the facts Jim ≠ George and Spouse(Jim,Laura)? If so, give a proof; if not, supply additional axioms as needed. What happens if we use Spouse as a unary function symbol instead of a binary predicate?

Answers

Yes, based on the facts Jim, George, and Spouse, the fact Spouse (George, Laura) follows.(Jim, Laura).The axioms would need to be changed if Spouse were to be used as a unary function symbol rather than a binary predicate because it would only accept one input rather than two otherwise.

What operators are unary operators?

A unary operator in the C programming language is a single operator that performs an operation on a single operand to create a new value. Operations like negation, increment, decrement, and others can be carried out by unary operators.

Binary: Is it a unary?

Binary and unary operators are the two categories of mathematical operations. Unary operators only require a single operand to accomplish an action. With two operands, binary operators can perform operations. The order of evaluation in a complex expression (one with two or more operands) is determined by precedence rules.

To know more abut unary visit:

https://brainly.com/question/30531422

#SPJ1

Initialized the variable with the value 0

Answers

var; x
x = 0

Are your referí g to something like this?
o think the answer is 57

Which of these are examples of an access control system? Select all that apply.

Answers

Some examples of access control systems are: Card-based access control systems, Biometric access control systems, Keypad access control systems, Proximity access control systems

Access control systems are used to limit or control access to certain areas or resources by determining who or what is authorized to enter or exit. In modern-day society, access control systems are widely used in both commercial and residential settings to enhance security and safety. Some examples of access control systems are discussed below.

1. Card-based access control systems- These are the most common types of access control systems. In card-based systems, authorized personnel are issued an access card that contains a unique code or number. When the person swipes the card through a reader, the system checks if the card is valid and then unlocks the door.

2. Biometric access control systems- In this system, the user's unique physical characteristics are used to identify them, such as fingerprints, voice, face, or retina scans. Biometric systems are highly accurate and provide enhanced security.

3. Keypad access control systems- Keypad systems use a secret code entered through a keypad. The code can be changed frequently to prevent unauthorized access.

4. Proximity access control systems- Proximity systems use a small chip or key fob that emits a radio signal to a reader mounted near the door. When the signal is received, the door unlocks. These are just a few examples of access control systems. There are other systems like security guards, smart cards, RFID-based systems, and more.

For more such questions on Proximity access, click on:

https://brainly.com/question/30733660

#SPJ8

for 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts.

Answers

For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts: True.

What is 802.11ac?

In Computer networking, 802.11ac is one of the wireless network standards which was developed by the Institute of Electrical and Electronics Engineers (IEEE) to operate on a 5 GHz microwave bandwidth (frequency) and as a result, it is faster and can transmit over a long distance.

As a general rule and generally speaking, a wireless security toolkit for 802.11 wireless networks should include all of the following features;

An ability to sniff wireless trafficAn ability to scan wireless hostsAn ability to assess the level of privacy afforded on its network.An ability to assess confidentiality afforded on its network.

Read more on wireless network here: brainly.com/question/18370953

#SPJ1

Complete Question:

For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts. True or False

true/false. the computer output above shows individual 95% ci for each mean. these intervals can be used to compare the population means to each other in a multiple comparison procedure.

Answers

The computer output above shows individual 95% ci for each mean. These intervals can be used to compare the population means to each other in a multiple comparison procedure.

The statement is True.

The computer output showing individual 95% confidence intervals for each mean can be used to compare the population means to each other in a multiple comparison procedure, such as a Tukey test or Bonferroni correction. These intervals can help determine which means are significantly different from each other and which are not.

When conducting a multiple comparison procedure, such as comparing means of multiple groups, it is important to account for the possibility of making false positive errors (Type I errors). In other words, if you test multiple hypotheses simultaneously, the probability of obtaining at least one significant result due to chance increases, even if all the null hypotheses are true.

One way to control for this issue is to adjust the significance level (alpha) or confidence intervals for each comparison. The Tukey test and Bonferroni correction are examples of procedures that adjust the confidence intervals.

Learn more about confidence intervals here:

brainly.com/question/24131141

#SPJ4

A trace table is used for

Answers

Answer:

Trace tables are used to allow programmers to trace the value of variables as each line of code is executed.

Explanation:

The values of the variables are displayed in a table and assist the programmer in identifying any potential errors.

Answer:

Trace tables can enable a programmer to trace the values of variables as each line is executed/processed/ran through the program. And yes, can aid programmers to identify potential errors in the code.

Explanation:

Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.

Answers

Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.

Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?

Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.

What are the three activities that Azure Active Directory Azure AD identity protection can be used for?

Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ1

Could anybody tell me the answer to 1.6.6 List Article for codehs? I am REALLY stumped and nothing seems to be working. An answer that i could copy and paste would be greatly appreciated.

Answers

Answer: Your welcome!

Explanation:

The answer to 1.6.6 List Article for CodeHS is an article titled "How to Use CodeHS for Teaching Computer Science". This article provides an overview of the CodeHS platform and provides information on how teachers can use CodeHS to teach computer science. It provides tips on setting up your classroom and how to create assignments, as well as how to use the CodeHS platform to assess students and provide feedback. Additionally, the article provides resources and links to help teachers get the most out of CodeHS.

The article describes how the CodeHS can be adopted by teachers in the classroom.

What is the CodeHS?

In the article, titled, "How to Use CodeHS for Teaching Computer Science" we learn that CodeHS is a platform that allows people to learn different types of programming.

The article further explained that teachers can incorporate this platform in the classroom and help students gain a better understanding of computing concepts. The benefits of the platform were also explained.

Learn more about the CodeHS here:

https://brainly.com/question/15599262

#SPJ2

What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?

Answers

Answer:

Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.


4. What information is in the payload section of the TCP segments?

Answers

The actual data being transferred, such as the content of a web page, an email message, or a file transfer, is contained in the payload part of the TCP segments.

The content of a TCP segment is what?

A segment header and a data chunk make up a TCP segment. There are ten required fields and one optional extension field in the segment header (Options, pink background in table). The payload data for the application is carried in the data section, which comes after the header.

What is the TCP Wireshark payload size?

In established mode, a packet's maximum payload size is 1448 bytes (1500 - 20 IP header - 32 TCP header).

To know more about data  visit:-

https://brainly.com/question/29851366

#SPJ1

7 steps in infographic design​

Answers

Answer:

Step 1: Choose your topic and research your audience. Before looking at your data, think about a topic and an audience with whom it can resonate.  

Step 2: Take a look at your data and consolidate it.  

Step 3: Craft the copy.  

Step 4: Design!  

Step 5: Review, review, review.

Step 6: Publish and promote.  

Conclusion.

Explanation:

Process infographics are a specific type of infographic, designed to visualize, summarize and simplify processes. They're perfect for visualizing marketing strategies, new employee onboarding, customer journey maps, product guides, recipes and more.

Anyone has any ideas for a gaming setup i can buy for christmas. Something with high framing rates (monitor included) for about 400 dollars. This is a social question for my class about computers and we need to find something for the class to use to)

Answers

Answer:

The one I am providing isn't a pre-built, but it does match your budget.

PARTS:

CPU AMD Ryzen 3 3200G AMD Ryzen 3 3200G $99

Motherboard Gigabyte B450M DS3H Gigabyte B450M DS3H $72

Memory G.Skill Aegis 16GB (2 x 8GB) DDR4-3200 CL16 G.Skill Aegis 16GB DDR4-3200 $61

Storage Crucial P1 500GB M2 NVMe SSD Crucial P1 500 GB M.2 $62

PC Case Cooler Master MasterBox Q300L TUF Edition Cooler Master Q300L TUF $47

Power Supply Thermaltake Smart BX1 RGB 550W 80+ Bronze Thermaltake Smart BX1 RGB 550W Power Supply 80 Plus Bronze $59

Total $398

What is up with the bots? They are so annoying.

Answers

Answer:

very very very annoying

Answer:

yeah

Explanation:

Which of the following is step two of the Five-Step Worksheet Creation Process?

Answers

Answer:

Add Labels.

As far as i remember.

Explanation:

Hope i helped, brainliest would be appreciated.

Have a great day!

   ~Aadi x

Add Labels is step two of the Five-Step Worksheet Creation Process. It helps in inserting the data and values in the worksheet.

What is label worksheet in Excel?

A label in a spreadsheet application like Microsoft Excel is text that offers information in the rows or columns around it. 3. Any writing placed above a part of a chart that provides extra details about the value of the chart is referred to as a label.

Thus, it is Add Labels

For more details about label worksheet in Excel, click here:

https://brainly.com/question/14719484

#SPJ2

How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once.

Answers

there are ten letters in the word, so for the first position we can choose out of 10 option.

no matter wich specific option we choose, we will have 9 letters left for the 2nd letter.

and 8 for the third place.

...

when we will have used up 9 of 10 letters, there will be only one option for the last place.

the number of possible decision-paths is therefore given by this expression:

10*9*8*7*6*5*4*3*2*1

wich is 3,628,800

there are quite a few ways to rearrange 10 letters

The sorting method which commands entries in a going to head predicated on each character without regard to space as well as punctuation, therefore there are 3628800 ways.

The word 'ALGORITHMS' has 10 letters. There is no repeated letter so, the first Letter can hold 10 places if we start taking one letter at a time. The second can then hold nine positions, the third can hold eight, and so on.

So, as \(\bold{ 10\times 9 \times 8.... \times 3 \times 2 \times 1 = 362,8800}\) ways, we have such a total number of ways.

Learn more:

brainly.com/question/17276660

give example of how loops are used​

Answers

Answer:

to repeat a set of code over and over

Explanation:

Write the Number class that can be used to test if the number is odd, even, and perfect. A perfect number is any number that is equal to the sum of its divisors. Write the NumberAnalyzer class that has an ArrayList of Number to determine how many numbers in the list are odd, even, and perfect.

Answers

Answer:

Explanation:

The following code is written in Python. It creates a class that takes in one ArrayList parameter and loops through it and calls two functions that check if the numbers are Perfect, Odd, or Even. Then it goes counting each and printing the final results to the screen.

class NumberAnalyzer:

   def __init__(self, myArray):

       perfect = 0

       odd = 0

       even = 0

       for element in myArray:

           if self.isPerfect(element) == True:

               perfect += 1

           else:

               if self.isEven(element) == True:

                   even += 1

               else:

                   odd += 1

       print("# of Perfect elements: " + str(perfect))

       print("# of Even elements: " + str(even))

       print("# of Odd elements: " + str(odd))

   def isPerfect(self, number):

       sum = 1

       i = 2

       while i * i <= number:

           if number % i == 0:

               sum = sum + i + number / i

           i += 1

       if number == sum:

           return True

       else:

           return False

   def isEven(self, number):

       if (number % 2) == 0:

           return True

       else:

           return False

A Process of receiving selecting
organizing interpreting checking and
reacting to sensory stimuli or data
so as to form a meaningful and
coherent picture of the world is
Select one:
a. Attitude
b. Perception
c. Communication
d. Thinking

= Perception​

Answers

Answer:

I think it’s B based on the answer choices

Explanation:

Consider the following incomplete method. Method findNext is intended to return the index of the first occurrence of the value val beyond the position start in array arr. I returns index of first occurrence of val in arr /! after position start; // returns arr.length if val is not found public int findNext (int[] arr, int val, int start) int pos = start + 1; while condition '/ ) pos++ return pos; For example, consider the following code segment. int [ ] arr {11, 22, 100, 33, 100, 11, 44, 100); System.out.println(findNext (arr, 100, 2)) The execution of the code segment should result in the value 4 being printed Which of the following expressions could be used to replace /* condition */ so that findNext will work as intended?
(A) (posarr.length) &&(arr [pos]- val)
(B) (arr [pos] != val) && (pos < arr. Îength)
(C) (pos (D) (arr [pos} == val) && (pos < arr. length)
(E) (pos

Answers

Answer:

B)

Explanation:

The while loop runs as long as two conditions are satisfied, as indicated by the && logical operator.

The first condition- arr[pos] != val

checks to see if the value in the array index, pos, is equal to the given value and while it is not equal to it, the second condition is checked.

The second condition(pos < are.length), checks to see if the index(pos) is less than the length of the array. If both conditions are true, the program execution enters the while loop.

The while loop is only terminated once arr[pos] == Val or pos == arr.length.

The plot of a video game is developed by which of the following occupations?
O video game artist
O graphic artist
O video game designer
O computer game programmer

HELP PLSSS!!!

Answers

Answer:

c video game designer

Explanation:

Answer:

CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC

Explanation:

when would it make sense not to use database system ​

Answers

 not needed for the user as it can cast a huge amount and overheads of purchasing the database and maintaining it:

Explanation:


how to play here!!!!!!!!!!!​

Answers

Answer:

what?

Explanation:

whaaattt????????????

Answer:

Choose a platform: Playing video games no longer requires a deicated console or a gaming computer

Explanation:

Write a SELECT statement without a FROM clause that uses the NOW function (research how to use NOW function in SQL) to create a row with these columns: today_unformatted The NOW function unformatted today_formatted The NOW function in this format: DD-Mon-YYYY This displays a number for the day, an abbreviation for the month, and a four-digit year. As mentioned, do not use FROM clause, as you are not selecting data from any table. Hint: Use AS command. (10 points) Important style guideline: For better readability of code, you should put each attribute in SELECT clause on a separate line and tab them (2 times) in this query.

Answers

Answer:

ALTER TABLE "table name"

ADD COLUMN today_unformated DATE DEFAULT AS (SELECT TOCHAR( NOW( ) :: date, " dd-Mon-yyyy")

Explanation:

The SQL query statements above add a new column called "today_unformated" to a table and set its default value to the current date of the local machine, with its format set to a number as day and year and a three-letter abbreviation as the month.

1) What is the first compartment of the 3 Sink Setup filled with?
O Multi-purpose detergent solution and water at least 110°F/37°C
O Baking soda solution and water at least 110°F/37°C
Isopropyl alcohol solution and water at least 110°F/37°C
Sanitizer solution and water at least 110°F/37°

Answers

The first compartment of the 3 Sink Setup is typically filled with option D:  a Sanitizer solution and water at least 110°F/37°

What is the first compartment of the 3 Sink Setup filled with?

The first part of the 3 Sink Setup is for cleaning and getting rid of germs.  People often call it the spot where you sanitize things. In this compartment, we mix a special cleaning liquid with water to make a sanitizer solution. We suggest keeping the water in this area at least as warm as 110°F/37°C.

Sanitizer is used to get rid of germs on things like dishes and kitchen surfaces. It stops germs from spreading and makes sure food is safe.

Learn more about  Sanitizer solution  from

https://brainly.com/question/29551400

#SPJ1

Write the remove_evens() function, which receives a list of integers as a parameter and returns a new list of integers containing only the odd numbers from the original list. The main program outputs values of the returned list. Hint: If the original list has even numbers, then the new list will be smaller in length than the original list and should have no blank elements. Ex: If the list passed to the remove_evens() function is [1, 2, 3, 4, 5, 6, 7, 8, 9], then the function returns and the program output is:

Answers

The program is an illustration of loops.

Loops are used to perform repetitive operations

The function in Python where comments are used to explain each line is as follows:

#This defines the function

def remove_event(mylist):

   #This creates a new list

   newList = []

   #This iterates through the list

   for i in mylist:

       #This checks if the current list element is not even

       if not i%2 == 0:

           #If yes, the element is appended to the new list

           newList.append(i)

   #This returns the new list

   return(newList)

Read more about similar programs at:

https://brainly.com/question/18269390

package Unit3_Mod2;


public class ImageExample3 {

public static void main (String[] argv)
{
int[][][] A = {
{
{255,200,0,0}, {255,150,0,0}, {255,100,0,0}, {255,50,0,0},
},
{
{255,0,200,0}, {255,0,150,0}, {255,0,100,0}, {255,50,0,0},
},
{
{255,0,0,200}, {255,0,0,150}, {255,0,0,100}, {255,0,0,50},
},
};

// Add one pixel on each side to give it a "frame"
int[][][] B = frameIt (A);

ImageTool im = new ImageTool ();
im.showImage (B, "test yellow frame");
}

public static int[][][] frameIt (int[][][] A)
{
//add code here
}
}
Make a yellow frame , one pixel to each side.

Answers

Answer:

To add a yellow frame of one pixel to each side of the input image represented by a 3D array A, we can create a new 3D array B with dimensions A.length + 2 by A[0].length + 2 by A[0][0].length, and set the values of the pixels in the frame to the RGB values for yellow (255, 255, 0).

Here is the implementation of the frameIt method:

public static int[][][] frameIt(int[][][] A) {

   int height = A.length;

   int width = A[0].length;

   int depth = A[0][0].length;

   int[][][] B = new int[height + 2][width + 2][depth];

   // Set the values for the corners of the frame

   B[0][0] = new int[] {255, 255, 0, 0};

   B[0][width + 1] = new int[] {255, 255, 0, 0};

   B[height + 1][0] = new int[] {255, 255, 0, 0};

   B[height + 1][width + 1] = new int[] {255, 255, 0, 0};

   // Set the values for the top and bottom rows of the frame

for (int j = 1; j <= width; j++) {

       B[0][j] = new int[] {255, 255, 0, 0};

       B[height + 1][j] = new int[] {255, 255, 0, 0};

   }

   // Set the values for the left and right columns of the frame

   for (int i = 1; i <= height; i++) {

       B[i][0] = new int[] {255, 255, 0, 0};

       B[i][width + 1] = new int[] {255, 255, 0, 0};

   }

   // Copy the original image into the center of the new array

   for (int i = 0; i < height; i++) {

       for (int j = 0; j < width; j++) {

           for (int k = 0; k < depth; k++) {

               B[i + 1][j + 1][k] = A[i][j][k];

           }

       }

   }

   return B;

}

Note that the RGB values for yellow are (255, 255, 0), but since the input array is using a 4-channel representation with an alpha channel (transparency), we are setting the alpha channel to 0 for all the yellow pixels. This means that the yellowframe will be fully opaque.

Hope this helps!

Corrine is writing a program to design t-shirts. Which of the following correctly sets an attribute for fabric? (3 points)

self+fabric = fabric
self(fabric):
self = fabric()
self.fabric = fabric

Answers

The correct option to set an attribute for fabric in the program would be: self.fabric = fabric

What is the program

In programming, defining an attribute involves assigning a value to a particular feature or property of an object. Corrine is developing a t-shirt design application and intends to assign a characteristic to the t-shirt material.

The term "self" pertains to the specific object (i. e the t-shirt) which Corrine is currently handling, as indicated in the given statement. The data stored in the variable "fabric" represents the type of material used for the t-shirt.

Learn more about program  from

https://brainly.com/question/26134656

#SPJ1

Other Questions
I need help with these can u at least show me how to solve this A passenger car weighs 4. 5 times 10 Superscript 3 units. Which unit of measure was used? grams ounces pounds tons. a compound containing 5.9265% hydrogen and 94.0735% oxygen has a molar mas of 34.01468g/mol. determine the emperical and molecular formula of this compound Identify major events leadingto the elimination of apartheid. HELPPPPPPPPPPPPPPPPPPPPP Helpppppp pleaseeeeee In your own words, explain what code switching is? Suppose u(0)=0 and u(0)=98. If (u/q)(0)=7, what is q(0) ? challenges faced by a receptionist and how to overcome them Jeff was struggling with his agggressive behavior. Throughout high school he often found himself in fights. Five years after high school he became an Extreme Sports contender. He channeled his agression and is happily married with a calmer personality outside the ring. the best known olmec works of art are a. pyramids. b. clay pottery. c. massive stone heads. d. obsidian statues. Why is a group of refugee children from the Capitol gathered outside President Snow's mansion? A They are celebrating the end of the war.B They are protesting against President Snow's dictatorship.C They are receiving food and medical aid.D They are acting as a human shield to protect Snow from the rebels. How does this passage show that King Claudius is a round character? He represents the idea of religious devotion. He has suddenly decided to step down and make Hamlet king. He shows a range of emotions, including guilt. He behaves exactly as he did earlier in the play. PLS ANSWER CORRECTLY 50 POINTS AND BRAINLIEST!!!During an investigation, a scientist burned 48 g of magnesium strip. After the reaction, the total mass of the product formed was found to be 80 g. Does the law of conservation of mass hold true in this case? Use complete sentences to justify your answer based on numerical calculations. SOMEONE HELP QUICCKCKKKK!!!! HELP PLEASE!!!!THERE R 3 QUESTIONS. MAKE SURE TO ANSWER ALL 3!!!TYSM The vertex form of the quadratic function f(x) = -6x - 60x - 151 isf(x)= a(x - h) + k.What is the value of a?What is the value of h?What is the value of k? ______________ is responsible for assigning and registering ip addresses in the north american region. What does rebuke in the Bible mean? Zoe and aspen were like two peas in a pod on the playground