Identify and describe the three basic operations used to extract useful sets of data from a relational database?

Answers

Answer 1

The select operation, The join operation, The project operation are the three basic operations used to extract useful sets of data from a relational database.

Describe the three basic operations used to extract useful sets of data from a relational database?

The select operation generates a subset from the table's records (rows) that satisfy the specified criteria. Relational tables are joined together to offer the user access to more data than is contained in each table alone. The project procedure generates a subset of the table's columns, enabling the user to construct new tables that only include the necessary data.

What actions are performed in a relational DBMS?

Relational algebra has five fundamental operations: Set Difference, Union, Cartesian Product, and Selection. Most required data retrieval activities are carried out by them.

To know more about database visit

brainly.com/question/29412324

#SPJ4


Related Questions

8. Imagine you have a closed hydraulic system of two unequal sized syringes

8.1 State how the syringes must be linked to obtain more force

8.2 State how the syringes must be linked to obtain less force

8.3 State when mechanical advantage of more than 1 (MA > 1) will be obtained in this system

8.4 State when mechanical advantage of less than 1 (MA < 1) will be obtained in this system



pls help asap!!!!​

Answers

To increase force in a closed hydraulic system, connect the smaller syringe to the output load and the larger syringe to the input force for hydraulic pressure amplification.

What is the closed hydraulic system

Connect the larger syringe to the output load and the smaller syringe to the input force to reduce force in the closed hydraulic system.

MA > 1 is achieved when the output load is connected to the smaller syringe and the input force is applied to the larger syringe, due to the pressure difference caused by their varying cross-sectional areas.

MA <1 when output load connected to larger syringe, input force applied to smaller syringe. Pressure difference due to cross-sectional area, output load receives less force than input force.

Read more about closed hydraulic system  here:

https://brainly.com/question/16184177

#SPJ1

What is the name of the big hole in the ground in Northern Arizona

Answers

Answer:

is that sink hole, I think it is

What is the purpose for the Information systems?

Answers

to have user get, store and distribute data out

hope this helps this

briefly describe architecture of IOT?​

Answers

Explanation:

IOT architecture consists of the devices, network structure, and cloud technology that allows IOT devices to communicate with each other. A basic IOT architecture consists of three layers: Perception (the sensors, gadgets, and other devices) Network (the connectivity between devices)

What are some current and future trends for network technology? Check all of the boxes that apply. an increase in the number and types of devices an increase in the people who will not want to use the network an increase in the number and types of applications an increase in the use of wired phones an increase in the use of the cloud

Answers

Answer: A,C,E

Source: trust me bro

3. Which of these TRUE about supporting ethical practices?
A. Employees are freely to use company software.
B. Employees can use any company resources.
c. Install and maintain a corporate firewall.
D. All the above.​

Answers

Answer:

D. All the above.​

Explanation:

Create an ArrayList of Countries

- Create a class called Country.java.

- Instance variables include name (String), capital (String), and population (an int representing the population of the capital)

- Write a 3-arg constructor

- Write 3 accessor methods

- Write a toString method that returns the state/value of all instance variables.


- Test out your class:

- Step 1: Create an ArrayList of five countries.

- Step 2: Print out your ArrayList.

- Step 3: Remove one of the countries.

- Step 4: Print out your ArrayList again.

- Step 5: Create a new country and insert it in the middle of your ArrayList.

- Step 7: Print out your ArrayList again.

- Step 8: Change your last country to the country you removed in Step 3.

- Step 9: Print out your ArrayList again.

Answers

Answer:

Step 1: Create an ArrayList of five countries by creating Country objects and adding them to the ArrayList.

Step 2: Print out your ArrayList by looping through it and printing out each Country object's toString() method.

Step 3: Remove one of the countries from the ArrayList by using the remove() method and passing in the index of the object you wish to remove.

Step 4: Print out your ArrayList again by looping through it and printing out each Country object's toString() method.

Step 5: Create a new country and insert it in the middle of your ArrayList by creating a Country object and using the add() method with the index of the position in the ArrayList.

Step 6: Print out your ArrayList again by looping through it and printing out each Country object's toString() method.

Step 7: Change your last country to the country you removed in Step 3 by first removing the last country from the ArrayList, creating a new Country object using the same parameters as the one you removed earlier, then using the add() method with the index of the last position in the ArrayList.

Step 8: Print out your ArrayList again by looping through it and printing out each Country object's toString() method.

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.
You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

Answers

Note that it is TRUE to state that you must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

How is this so?

Azure Event Hubs, a   data streaming platform,can be integrated with Azure Active Directory (Azure AD) for authentication and authorization purposes.

This ensures that requests to access and utilize Event Hubs resources are authorized and controlled through Azure AD, providing secure and authorized access to the application.

Learn more about Azure Active Directory at:

https://brainly.com/question/28400230

#SPJ1

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.

You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

True or False?

find four
reasons
Why must shutdown the system following the normal sequence

Answers

If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.

"init 0" command completely shuts down the system in an order manner

init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.

İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0

shuts down the system before safely turning power off.

stops system services and daemons.

terminates all running processes.

Unmounts all file systems.

Learn more about  server on:

https://brainly.com/question/29888289

#SPJ1

Write a function that takes, as an argument, a list, identified by the variable aList. If the list only contains elements containing digits (either as strings as non-negative integers), return the string formed by concatenating all of the elements in the list (see the example that follows).

Answers

Answer:

The function is as follows:

def concList(aList):

   retList = ""

   for i in aList:

       if(str(i).isdigit()):

           retList+=str(i)

       else:

           retList = "Not digits"

           break;

   return retList

Explanation:

This defines the function

def concList(aList):

This initializes the return string to an empty string

   retList = ""

This iterates through aList

   for i in aList:

This converts each element of the list to an empty list and checks if the string is digit

       if(str(i).isdigit()):

If yes, the element is concatenated

           retList+=str(i)

If otherwise

       else:

The return string is set to "No digits"

           retList = "Not digits"

And the loop is exited

           break;

This returns the return string

   return retList

Reusing PCBs of destroyed processes instead of freeing up the data structures eliminates the overhead of dynamic memory management but is likely to use more memory. Assume the following: • . The number of processes to be created and destroyed over a period of time is 10,000. The average number of processes coexisting at any given time is 100. The maximum number of processes coexisting at any given time is 600. Allocating and freeing a PCB take the same amount of time.
Question 1: How many memory operations (allocate or free) will be performed without PCB reuse?
Question 2: How many PCBs will coexist in memory, on average, during the entire run without PCB reuse?

Answers

Answer:

Question 1.  A maximum of 600 PCBs will be needed, all of which will be freed at the end of the run. The total is 2*600 = 1,200 memory operations.

Explanation:

Since 100 processes will coexist at any given time, 100 PCBs will reside in memory on average.

How many times to divide by zero? Write a function called Divide which divides two numbers, and keeps count of how many times the function was called asking to divide by zero. The function has two outputs: z, the division of the two numbers, and times, the number of times the function was called with a divide-by-zero request. In the case of a divide-by-zero request, the resultant should be set to not a number (NaN). Restriction: The function must make use of a persistent variable. Ex: >> clear all; x=1; y=1; [z,times] = Divide ( x, y) z =
1
times = []
>> = [l x=1 ; y=0 ; [z,times] = Divide (x, y) NaN times = 1 >> x-2; y=0;[z,times] = Divide(x,y) ; howmany=
2
z =
NaN times =
2

Answers

Here's a possible implementation of the Divide function using a persistent variable to keep track of the number of times it was called with a divide-by-zero request:

The Program

function [z, times] = Divide(x, y)

persistent count

if isempty(count)

   count = 0;

end

if y == 0

   z = NaN;

   count = count + 1;

else

   z = x / y;

end

times = count;

end

The function first checks if the persistent variable count has been initialized (i.e., if it's empty). If it's empty, it sets it to zero. Then, it checks if the second input argument y is equal to zero. If it is, the function sets the output z to NaN and increments the count variable. If y is not zero, the function performs the division and sets z accordingly. Finally, the function sets the times output to the current value of count.

To use the function, you can call it with two input arguments x and y:

[x, y] = deal(1);  % set x and y to 1

[z, times] = Divide(x, y)  % z = 1, times = 0

If you call the function with a divide-by-zero request, the z output will be NaN and the times output will be incremented:

[x, y] = deal(1, 0);  % set x to 1 and y to 0

[z, times] = Divide(x, y)  % z = NaN, times = 1

You can call the function multiple times with different input arguments, and the times output will keep track of the total number of divide-by-zero requests:

[x, y] = deal(1, 0);  % set x to 1 and y to 0

[z, times] = Divide(x, y)  % z = NaN, times = 1

x = x - 2; y = 0;

[z, times] = Divide(x, y)  % z = NaN, times = 2

Read more about program functions here:

https://brainly.com/question/24846399

#SPJ1

Design a flowchart and pseudo code Draw a flowchart and write pseudo code to represent the logic of a program that allows the user to enter two values. The program outputs the sum of and the difference between the two values.

Answers

Pseudocode's flexibility, it is widely used to describe algorithms. It offers a clear and succinct approach to represent the reasoning by combining statements from computer languages like Java, maths expressions, and statements from normal languages like English.

What Design a flowchart and pseudocode?

A series of predetermined steps used to solve a problem or complete a task constitutes an algorithm. An algorithm often requires inputs in the form of data or resources, and outputs in the form of the results it creates.

Therefore, 1. Request that the user provide the width of the wall in feet 2. Read user input and put the value into the “width” variable. 3. Request that the user enter the value of the wall's length in feet. 4. After reading user input, assign the value to the length variable. 5. Area = width times length 6. The exhibit area.

Learn more about pseudocode here:

https://brainly.com/question/14821443

#SPJ1

Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.

Answers

Since my friend said  “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.

What is a resume builder?

A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.

There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.

Note that the Resume Builder often helps to formats your documents in an automatic way  every time you make any change.

Learn more about resume template from

https://brainly.com/question/14218463
#SPJ1

bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD

Answers

Bill is replacing a worn-cut cable for his power table saw.  is using is A. PSC (Portable Cord).

What is the bills?

Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.

A is the most probable  type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.

Learn more about bills from

https://brainly.com/question/29550065

#SPJ1

What happens after the POST?

Answers

After the POST, the computer is ready for user interaction. Users can launch applications, access files, browse the internet, and perform various tasks depending on the capabilities of the operating system and the installed software.

After the POST (Power-On Self-Test) is completed during a computer's startup process, several important events take place to initialize the system and prepare it for operation. Here are some key steps that occur after the POST:

1. Bootloader Execution: The computer's BIOS (Basic Input/Output System) hands over control to the bootloader. The bootloader's primary task is to locate the operating system's kernel and initiate its loading.

2. Operating System Initialization: Once the bootloader locates the kernel, it loads it into memory. The kernel is the core component of the operating system and is responsible for managing hardware resources and providing essential services.

The kernel initializes drivers, sets up memory management, and starts essential system processes.

3. Device Detection and Configuration: The operating system identifies connected hardware devices, such as hard drives, graphics cards, and peripherals.

It loads the necessary device drivers to enable communication and proper functioning of these devices.

4. User Login: If the system is set up for user authentication, the operating system prompts the user to log in. This step ensures that only authorized individuals can access the system.

5. Graphical User Interface (GUI) Initialization: The operating system launches the GUI environment if one is available. This includes loading the necessary components for desktop icons, taskbars, and other graphical elements.

6. Background Processes and Services: The operating system starts various background processes and services that are essential for system stability and functionality.

These processes handle tasks such as network connectivity, system updates, and security.

For more such questions on POST,click on

https://brainly.com/question/30505572

#SPJ8

Write a Python programs to do frequency counting of the sum of two dice. Your function should accept an integer n parameter to run n trials (i.e., multiple rollings of the two dice); You can use the Python function randrange(1, 7) to simulate the roll of one die; After running the n trials, your function should return the sum of two dice that occurs most frequently.

Answers

Answer:

Explanation:

The following program uses Numpy import to detect the frequency of all the elements in an array and ouput the one that appears the most. The function creates random dice rolls and adds them to the array, looping the number of times that the trials parameter states. Then finally printing out the original array and the sum that appeared the most frequently.

from random import randrange

import numpy as np

def highestFrequency(trials):

   products = []

   for x in range(trials):

       product = randrange(1, 7) * randrange(1, 7)

       products.append(product)

   x = np.array(products)

   print("Original Array: " + str(list(products)))

   print("Most frequent value in the above array:")

   print(np.bincount(x).argmax())

highestFrequency(7)

Write a Python programs to do frequency counting of the sum of two dice. Your function should accept

Need help fixing my code!!
Keep getting an error code that says my member is inaccessible

Need help fixing my code!!Keep getting an error code that says my member is inaccessible

Answers

The program that shows the fixing of the code is given below.

How to explain the information

class Player {

protected:

   std::string name;

   Card playerCards[10];

   bool canHit;

   int handvalue;

public:

   Player(const std::string& playerName) : name(playerName), canHit(true), handvalue() {}

   void receiveCard(const Card& card) {

       playerCards[handvalue++] = card;

   }

   void setCanHit(bool canHitValue) {

       canHit = canHitValue;

   }

   int getHandValue() const {

       return handvalue;

   }

};

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Because of inability to manage those risk. How does this explain the team vulnerability with 5 points and each references ​

Answers

The team is vulnerable due to a lack of risk assessment. Without risk understanding, they could be caught off guard by events. (PMI, 2020) Ineffective risk strategies leave teams vulnerable to potential impacts.

What is the inability?

Inadequate contingency planning can hinder response and recovery from materialized risks. Vulnerability due to lack of contingency planning.

Poor Communication and Collaboration: Ineffective communication and collaboration within the team can make it difficult to address risks collectively.

Learn more about inability  from

https://brainly.com/question/30845825

#SPJ1

TRUE/FALSE. because the expedited irb review process is generally used for certain types of minimal risk research, it is less stringent than review by the full irb.

Answers

Because the expedited IRB review process is generally used for certain types of minimal risk research, it is less stringent than review by the full IRB. [FALSE]

What is IRB (Institutional Review Board)

The Institutional Review Board (IRB) is an independent committee established to review and approve research involving human subjects. The main purpose of the IRB is to protect the rights and well-being of human subjects. Informed consent is an important component.

In accordance with FDA regulations, the IRB has the authority to approve, require modifications in (for approval), or refuse research. This group review plays an important role in the protection of the rights and well-being of human research subjects.

What is the purpose of the IRB Institutional Review Board

An institutional review body (IRB) is tasked with reviewing all studies involving human subjects to protect their rights and well-being.

Learn more about IRB at https://brainly.com/question/14353183.

#SPJ4

Every device connected to the public Internet is assigned a unique number known as: a. an Internet Protocol (IP) addres

Answers

Answer:

yes

Explanation:

its the number used to identify the devise connected to the internet

How has the rise of mobile development and devices impacted the IT industry, IT professionals, and software development

Answers

Answer:

Throughout the interpretation section elsewhere here, the explanation of the problem is summarized.

Explanation:

The growth of smartphone production and smartphone apps and services, as well as the production of smartphones, has had a positive influence on the IT industry, IT practitioners, as well as the development of the technology. As normal, the primary focus is on smartphone apps instead of just desktop software. As we recognize, with innovative features, phone applications, and smartphones are all made, built, modernized every day, and always incorporated with either the latest technology.This has now resulted in far more jobs and employment for the IT sector, and therefore new clients for service-based businesses. It provided various-skilling the application production industry for IT experts including learning how to work on emerging technology. The demand for software production and software growth is evolving at a greater speed than it's ever been, so the increase of smartphone production and smartphones has had a very beneficial effect on perhaps the IT sector, IT practitioners, and business development.

Which devices are likely to include a computer? Select 3 options.

cell phone
toaster
ATM cash machine at the bank
lawnmower
GPS mapping device

Answers

Answer:

Cell Phone, ATM Cash Machine, and a GPS Mapping Device

Answer:

Right answers:

ATM cash machine at the bank GPS mapping deviceCell phone

Explanation:

Edge 2022

Which devices are likely to include a computer? Select 3 options.cell phonetoasterATM cash machine at

2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
please guys my grade depends on it 50 POINTS.

Answers

Some artists might want to extend copyright longer than the law allows because;

They want to maintain sole rights to the work.They do not want others to claim their intellectual property.They want to distribute the works personally while gaining the financial benefits that come with it.

What is Copyright?

Copyright refers to the legal rights of creators to claim ownership of their work. The law allows the copyright owners some time to claim ownership after which the work can go to the public domain.

However, some chose to renew the copyright because of their attachment to the work and desire to maintain full rights over their innovations.

Learn more about Copyright here:

https://brainly.com/question/1078532

Social media first became popular due to which development?
A. More consumers began using smartphones and tablets.
B. Personal computers became less expensive for home users.
C. It became easier to send audio and video files.
D. More computers were connected to the internet.

Answers

i think it's A because it sounds more reasonable

A ______ can hold a sequence of characters such as a name.

Answers

A string can hold a sequence of characters, such as a name.

What is a string?

A string is frequently implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. A string is typically thought of as a data type. Data types that are character strings are the most popular.

Any string of letters, numerals, punctuation, and other recognized characters can be stored in them. Mailing addresses, names, and descriptions are examples of common character strings.

Therefore, a string is capable of storing a group of characters, such as a name.

To learn more about string, refer to the link:

https://brainly.com/question/17091706

#SPJ9

Need help with CST105 exercise 5 (JAVA)

Need help with CST105 exercise 5 (JAVA)

Answers

Below is an example of a Python program that reads text from a file called "input.in" as well as encrypts all of the word based on the said rules.

What is the Java program about?

Program opens "input.in", reads words using read() and split(), creates encrypted_words list to store encrypted versions. Loop through each word and move the first half to the end if the length is even to encrypt it. If n is odd, move (n+1)/2 letters to end and convert to all-caps with upper() method.

Therefore, the code stores encrypted words in a list and writes them along with their original versions in a tabular format in the "results.out" file. "Program assumes input file has only words, may need modification to handle punctuation."

Learn more about Java program from

https://brainly.com/question/25458754

#SPJ1

See text below



CST-105: Exercise 5

The following exercise assesses your ability to do the following:

Use and manipulate String objects in a programming solution.

1. Review the rubric for this assignment before beginning work. Be sure you are familiar with the criteria for successful completion. The rubric link can be found in the digital classroom under the assignment.

2. Write a program that reads text from a file called input.in. For each word in the file, output the original word and its encrypted equivalent in all-caps. The output should be in a tabular format, as shown below. The output should be written to a file called results.out.

Here are the rules for our encryption algorithm:

a.

If a word has n letters, where n is an even number, move the first n/2 letters to the end of the word. For example, 'before' becomes 'orebef

b. If a word has n letters, where n is an odd number, move the first (n+1)/2 letters to the end of the word. For example: 'kitchen' becomes 'henkitc'

Here is a sample run of the program for the following input file. Your program should work with any file, not just the sample shown here.

EX3.Java mput.ix

mputz.txt w

1 Life is either a daring adventure or nothing at all

Program output

<terminated> EX3 [Java Application] CAProg

Life

FELI

is

SI

either

HEREIT

a

A

daring

INGDAR

adventure

TUREADVEN

or

RO

nothing

INGNOTH

at all

TA

LAL

3. Make a video of your project. In your video, discuss your code and run your program. Your video should not exceed 4 minutes.

Submit the following in the digital classroom:

A text file containing

O

Your program

O

A link to your video

Need help with CST105 exercise 5 (JAVA)

Implement a function inValues() that asks the user to input a set of nonzero floating-point values. When the user enters a value that is not a number, give the user a second chance to enter a value. After two mistakes in a row, quit the program. When the user enters 0, the function should return the sum of all correctly entered values. Use exception handling to detect improper inputs.

Answers

Answer:

Explanation:

The following is written in Python and uses exception handling to do exactly as requested. It then goes adding all of the integer values to an array called num_list and finally adding them all together when the function ends.

def in_values():

   num_list = []

   while True:

       try:

           num = input("Input non-zero floating point: ")

           num = int(num)

           if num == 0:

               break

           else:

               num_list.append(num)

       except ValueError:

           print("No valid integer! Please try again ...")

           try:

               num = input("Input non-zero floating point: ")

               num = int(num)

               break

           except ValueError:

               break

   sum = 0

   for number in num_list:

       sum += number

   return sum


A chain of dry-cleaning outlets wants to improve its operations by using data from
devices at individual locations to make real-time adjustments to service delivery.
Which technology would the business combine with its current Cloud operations
to make this possible?
O Edge Computing
O Blockchain
O Data Visualization
O Public Cloud

Answers

A










explanation cause it is

Can anyone give me $2 (Reddem code/Promo Code)​

Answers

I can give you 10% off at makeup stores? Where would you like the code for?
Other Questions
you will analyze data collected from a lab to explain the concept of toxicity and demonstrate how to calculate the ld50 for a particular organism. be sure to read the lab completely before beginning your investigation. submit your completed assignment according to your teacher's instructions. background: ld50 it is important for environmental scientists to examine the influence of toxic substances on organisms. this does not mean that they superfluously expose organisms to hazardous materials; this means that they learn to recognize what levels of substances become threats in order to take preventative measures. lc is shorthand for lethal concentration. typically, lc refers to toxic chemicals found in the air, but in environmental science the lc is also used when studying toxic chemicals found in water. lc50 is the concentration of toxin that kills 50% of the observed organisms. when testing for lc50, scientists must consider, those organisms that die of natural causes versus those organisms that die due to the concentration of toxins present. to account for this, many trials are conducted at several concentrations to account for errors. the commonly used term to describe ingestion toxicity is ld50. ld means lethal dose and the subscript 50 means that the dose was lethal to 50% of the animals to which the chemical was administered under controlled laboratory conditions. ld50 values are measured from zero up, therefore, the lower the ld50, the more toxic the chemical. therefore, a chemical with an oral ld50 of 500 would be much less toxic than a chemical with an ld50 of 5. ld50 values are expressed as milligrams per kilogram (mg/kg), which means mg of chemical per kg of body weight of the animal. mg/kg is the same as ppm. Read the excerpt below, and answer the question that follows.He was a thing of the wild, come in from the wild to sit by John Thornton's fire, rather than a dog of the soft Southland stamped with the marks of generations of civilization.The quotation above suggests that Buck is _____.still adaptingtransformed into a wild thingconflicted about his identitydomesticated Whys and explanation of which human activities can cause drought a senior citizen center asked its visitors about their favorite activities the table shows the results what was the relative frequancy of choosing dancing What is the solution of the system of equations shown below?y = x + 3y = 4x 2 A culture started with 5,000 bacteria. After 7hours, it grew to 5,500 bacteria. Predict howmany bacteria will be present after 11 hours.Round your answer to the nearest wholenumber. 25 POINTS PLEASE HELPSome historians claim that Justinian was the best Byzantine emperor. Which statements might support that claim?Check all that are true.1. Justinian's law code shaped Byzantine life and future law codes throughout the world.2. Justinian expanded the empire to its greatest size.3. Justinian was able to pass a financially stable empire on to his successors.4. Justinian successfully defended Constantinople from many invading forces.5. Under Justinian's direction, the Hagia Sophia and other important construction projects were completed. PLEASE HELP!!! Whoever answers first gets brainiest!!!!What famous bridge can be found in New York City which has a steel frame surrounded by concrete?A.golden gate bridge B.Jefferson bridge C.Brooklyn bride D.Tacoma bride Choose all the materials that S-waves cannot travel through.-water-solid rock-sand-molten rock-gas When designing code, which of the following best describes the purpose of a Post Mortem Review? To obtain feedback on the code To translate pseudocode to program code To use code only one time To check if others have the same code Evaluaten. 8m +4P for m = 4, n = 2, and p = 3.solve[tex]2 \times \sqrt{84} + 4 \div 3[/tex] A card is drawn at random out of a well-shuffled deck of 52 cards.Find the probability of drawing a card thats notten 1. Find the greatest root of nonlinear equation x cos(x/2) - e* = 0 on interval (a,b), a, b e Z. Approximate the root by Newton method with precision E = 0.001. please help.. i rlly need this completed. Which of the following statements best describes the elaboration stage of organizational life cycle?Group of answer choicesIt is the life cycle stage in which an organization is born and its emphasis is on creating a product and surviving in the marketplace.It is a mature stage of the life cycle in which a red tape crisis is resolved through the development of a new sense of teamwork and collaboration.It is the life cycle stage that involves the installation and use of rules, procedures, and control systems.It is the life cycle stage in which employees identify with the mission of the organization and spend long hours helping the organization succeed. - Clare removed marbles from a container ofwater. When she removed 2 marbles, thewater level was 80 ml. When she removed4 more marbles, the water level was 40 ml.Write an equation for the water level y afterx marbles are removed. Which of the following function is irreducible? a) f(x) = x3 + 2x + 1 Z3[x]. b) f(x) = x2 + 4 25[x]. c) f(x) = x3 + 2x + x ER[x]. d) f(x) = x2 + 2x + 1 Q[x]. e) f(x) = 4x2 + 2x e Z[x]. Rice is sold at a profit of $4 per kg. Find the overall profit if150 kg of rice is sold. biofilms are medically significant because they can adhere to the surfaces of ______. What factors did President Trump take into account in nominating Neil Gorsuch, Brett Kavanaugh, and Amy Coney Barrett to fill Supreme Court vacancies? under what circumstances did the vacancies become available? what were the results? and why?