Write the SQL code required to list all employees whose last names start with Smith. In other words, the rows for both Smith and Smithfield should be included in the listing. Assume case sensitivity.

Answers

Answer 1

To list all employees whose last names start with "Smith" using SQL, you can use the LIKE operator with a pattern-matching condition. Here's an example code:

sql

Copy code

SELECT * FROM employees

WHERE last_name LIKE 'Smith%'

In this code, the % wildcard is used after the "Smith" pattern to match any characters that come after it. This ensures that both "Smith" and "Smithfield" will be included in the result set. The LIKE operator performs a case-sensitive search, so it will only match last names starting with "Smith" exactly as specified.

The * is used to select all columns from the "employees" table. Adjust the table and column names as per your database schema.

Learn more about SQL code here

https://brainly.com/question/13617208

#SPJ4


Related Questions

With the Internet Transport Protocol UDP (User Datagram Protocol): i UDP is a connection-oriented protocol ii UDP transmits segments consisting of an 8-byte header followed by the payload; the two ports in the header serve to identify the end-points on each machine; so when a UPD packet arrives its payload is handed to the process attached to the destination port iii UDP does not do flow control, congestion control, or retransmission upon receipt of a bad segment iv one area where UDP is especially useful is client-server applications (as clients send a short request and expect a short reply from the server)

Answers

UDP (User Datagram Protocol) is a connectionless transport protocol, which means it does not establish a connection before transmitting data. Instead, UDP transmits segments consisting of an 8-byte header followed by the payload. The two ports in the header serve to identify the end-points on each machine, so when a UDP packet arrives, its payload is handed to the process attached to the destination port.

Unlike TCP, UDP does not do flow control, congestion control, or retransmission upon receipt of a bad segment. This can make UDP faster and more efficient, but it also means that data may be lost or corrupted during transmission.One area where UDP is especially useful is in client-server applications. In these applications, clients send a short request and expect a short reply from the server. UDP can be used to transmit these requests and replies quickly and efficiently, without the overhead of establishing a connection or managing flow and congestion control. However, it is important to note that UDP is not suitable for all types of applications, as the lack of reliability can be a problem in some cases.

Learn More About User Datagram Protocol: https://brainly.com/question/20038618

#SPJ11

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

PLEASE HURRY!!!
Wyatt has a database to keep track of an enormous collection of videos. How can Wyatt find the record for the game Lost on Mars?
a)sort the data
b)filter the data
c)query the data
d)edit the data

Answers

Answer:

Wyatt could sort the data by month

Explanation:

You are configuring a wireless router for a home office. Which of the following changes will have the least impact on improving the security of the network?
A. Enabling MAC filtering
B. Disabling the SSID broadcast
C. Configuring WPA2
D. Changing the default username and password

Answers

Option B, disabling the SSID broadcast, will have the least impact on improving the security of the network.

Although it may provide some level of obscurity by not broadcasting the network name or presence, this is a relatively weak security measure as it can be easily circumvented by attackers who know the network is there or who use tools to detect hidden networks.

On the other hand, enabling MAC filtering, configuring WPA2, and changing the default username and password are all significant security measures that can greatly improve the security of the wireless network. Enabling MAC filtering allows the router to only allow connections from devices with pre-approved MAC addresses, which can significantly limit unauthorized access. Configuring WPA2 provides strong encryption for the wireless network, making it difficult for unauthorized users to intercept or decode wireless communications. Changing the default username and password makes it more difficult for attackers to gain access to the router's configuration settings.

In summary, while disabling the SSID broadcast may provide some minor level of security, enabling MAC filtering, configuring WPA2, and changing the default username and password are much more effective measures for securing a wireless network.

Learn more about SSID here:-brainly.com/question/30454427

#SPJ11

x = 10
y = 20
x > y
print("if statement")
print("else statement")

Answers

I dont really understand what you want to do but im gonna answer it as if I understood it.

If x is 10 and y is 20 then y is larger than x

Given the following function, what is the parameter name for the function's parameter?
func delete(file path: String) -> Bool {
// code
}
Group of answer choices
delete
file
path
filePath
String
Bool

Answers

The parameter name for the function's parameter is "path" and not the filepath.

func delete(filepath: String) -> Bool {

   // code

}

the parameter name for the function's parameter is "path".

The function is called delete(file:path:), indicating that it takes one parameter labeled "file" externally, and "path" internally.

When calling the function, the caller would use the external parameter name "file" to pass in an argument for the "path" parameter, like so:

let result = delete(file: "/path/to/file")

Inside the function body, the parameter can be referred to using its internal name "path", like so:

func delete(filepath: String) -> Bool {

   // use the `path` parameter here

   // code

}

Therefore, "path" is the parameter name for the function's parameter in this case.

Learn more about string in c++ with example?:https://brainly.com/question/30392694

#SPJ11

describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation​

Answers

Answer:

Explanation:

Good organization, complete information and clear writing are the most effective ways to design a document.

I hope this helps

Which of the following types of auditing requires access to source code?
Question options:
1. Use Case Testing
2. Code Review
In order for a subject to be _____, the system must first ____ the subject and then record the subject's actions.
Question options:
1. accountable, identify
2. accountable, authorize
A company needs to conduct testing of technical controls as part of an IT Security Audit. Which of the following types of testing allows the auditor to have full knowledge of the internals for the system(s) under test at the time the tests are being designed or selected?
Question options:
1. White box testing
2. Gray box testing
What is the primary difference between second party and third party audits?
Question options:
1. Second party audit teams are granted inside access to the organization's operations. Third party audit teams are limited in their access to the organization's operations.
2. Second party audits are external audits conducted on behalf of a business partner. Third party audits are conducted to provide assurance of compliance with laws and regulations.

Answers

auditing requires access to source code is 2. Code Review.

Source code audit: what is it?

A code audit entails looking at your source software to find any flaws, mistakes, or places that don't meet the quality standards established by your business.In the defense programming model, which tries to eradicate problems before a software deployment, a code review is a crucial stage.

What does access control audit entail?

Monitoring and analyzing system events, mistakes, access, or authentication attempts is the process of auditing.

To know more about source code visit:

https://brainly.com/question/12951057

#SPJ4

Which text most closely resembles the form in which one instruction is stored in a single location of a typical computer's memory?

Answers

A text which most closely resembles the form in which an instruction is stored in a single location of a typical computer's memory is: c. Add 34, #9, 25.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouse

What is a memory?

A memory can be defined as a terminology that is used to describe the available space on an electronic device that is typically used for the storage of data or any computer related information such as:

ImagesVideosTextsMusicCodesFolders

In computer science, we can infer and logically deduce that "add 34, #9, 25." is a text which most closely resembles the form in which an instruction is stored in a single location of a typical computer's memory.

Read more on memory here: https://brainly.com/question/24881756

#SPJ1

Complete Question:

Which text most closely resembles the form in which one instruction is stored in a single location of a typical computer's memory?

a. w = (x + y) * (y - z)

b. w = x + 000111 - (y * 1110101)

c. Add 34, #9, 25

d. (Mul 45, 2) + (Mul 33, 5) + (Mul 4, 8)

model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Answers

According to the social convoy theory of social relationships, people live their lives as part of a personal network of people to whom they provide support and from whom they receive it.

What is the meaning of social convoy?

The people that travel with us on the road of life are referred to as the social convoy. At every stage of development, this social grouping is a crucial component of successful adjustment and wellbeing.

As one matures and develops, they rely on these interactions and connections because all are social beings. Social convoy is a network of friends that travel through life with us and support us through both good and difficult times.

Learn more about social convoy from here:

https://brainly.com/question/7318152

#SPJ1

The complete question has been attached in text form:

In the social ______ model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Choose the best answer in each of the drop-down menus.

Choose the best answer in each of the drop-down menus.

Answers

Answer:

whata r in the windows pls list them

Explanation:

An apple cake recipe calls for 454 grams of apples and 50 grams of raisins. How many kilograms of fruit are needed to make 12 cakes?

Answers

Answer:

9.08

Explanation:

Because 454 divided by 50 is 9.08

The ______ layer defines frameworks that support graphics and media, including Quicktime and OpenGL.

Answers

The term that fits in the blank is "Media". The media layer defines frameworks that support graphics and media, including QuickTime and OpenGL. QuickTime is an Apple media player that enables playback of digital video and audio, while OpenGL is a cross-platform library used to develop interactive 3D graphics applications.

The media layer is one of four layers that comprise Apple's macOS operating system. The other three layers are the core operating system layer, which is responsible for managing hardware, network connections, and system-level services; the Core Services layer, which includes common libraries, frameworks, and other support components; and the Application layer, which is responsible for running user-level software.

The media layer is a critical component of macOS, as it enables the development of rich, multimedia applications. For example, applications like Final Cut Pro, Logic Pro, and GarageBand, which are all developed by Apple, use the media layer extensively to support media playback and editing.

In addition to QuickTime and OpenGL, the media layer includes frameworks like Core Audio, Core Video, and Core Animation. These frameworks provide developers with a wide range of tools for building sophisticated media applications, from simple audio players to complex 3D graphics engines.

To know more about interactive visit :

https://brainly.com/question/31385713

#SPJ11

What are some ways tables can be inserted into a document? Check all that apply

•drawing table
•using a dialog box
•using quick tables
•using the save options
•converting an image to a table
•adding an excel spreadsheet

Answers

Answer:

drawing tableusing quick tablesconverting an image to a table.

Answer:

its 1. 2. 3. 6.

Explanation:

For which of the following are music editors responsible? (Select all that apply).


editing a film’s score

structuring the soundtrack

shooting interiors

editing a film’s musical soundtrack

Answers

Answer:

A: structuring the soundtrack

B: editing a film's score

D: editing a films musical soundtrack

Explanation:

edg2021

(other test answers:

(all but "long-lasting shots of the characters speaking"

true (that film editors review footage and notes from director...)

computer graphics

it indicates an exterior shot of an urban street scene )

For which of the following are music editors responsible? (Select all that apply).editing a films scorestructuring

the expression reduce(max, [34, 21, 99, 67, 10]) evaluates to

Answers

The expression reduce(max, [34, 21, 99, 67, 10]) evaluates to 99.

In this expression, `reduce` is a function typically used in functional programming languages, such as Python. It applies a specified function, in this case, `max`, to the elements of an iterable, which is `[34, 21, 99, 67, 10]` in this example. The `max` function is used to find the maximum value among the elements.

By applying the `max` function to the iterable, it compares the elements pairwise and returns the maximum value. In this case, the maximum value in the list `[34, 21, 99, 67, 10]` is 99. Therefore, the expression evaluates to 99.

To know more about Python

brainly.com/question/30391554

#SPJ11

Why should you always name directory files using lowercase letters?

Answers

Answer: Using all-lowercase filenames rather simplifies things here. If you somehow make the directory available to a Windows system, it will not be able to access both files. It will probably be able to access only the one that appears first in the directory, regardless of which name you use

Explanation:

What's the keyboard shortcut to undo your last command?

Answers

The keyboard shortcut to undo your last command varies depending on the operating system and the application you are using. Here are some commonly used keyboard shortcuts for undoing actions:

1. Windows and Linux: Ctrl + Z

2. Mac: Command + Z

These shortcuts work in many applications such as text editors, word processors, graphic design software, web browsers, and email clients. They allow you to quickly undo your most recent action or revert to a previous state.

It's important to note that not all applications or actions support the undo function, and some applications may have different keyboard shortcuts for undoing specific actions.

Additionally, some applications may offer multiple levels of undo, allowing you to undo multiple actions in sequence by repeatedly pressing the undo shortcut.

learn more about applications here:

https://brainly.com/question/31164894

#SPJ11

matlab error: function definitions are not permitted in this context.

Answers

The error message "function definitions are not permitted in this context" is a common issue that MATLAB users may encounter when defining functions within scripts or other functions. This error message usually indicates that the function definition is placed in an inappropriate location within the MATLAB code.

In MATLAB, functions can be defined in two different ways: as standalone files (known as "function files") or as nested functions within other scripts or functions. When defining a nested function, it is important to ensure that the function definition is placed within the correct scope. For example, if a function is defined within another function, it should be defined after all other variables and functions that are used within the parent function. Additionally, the nested function should be defined before any code that calls the nested function.
If the function definition is placed in an incorrect location, MATLAB may return the error message "function definitions are not permitted in this context." To resolve this error, the user should carefully examine the code and move the function definition to the appropriate location.
In summary, the error "function definitions are not permitted in this context" is a common issue that can be resolved by ensuring that the function definition is placed in the correct location within the MATLAB code. It is important to carefully examine the code and move the function definition as necessary.

Learn more about location here:

https://brainly.com/question/14134437

#SPJ11

Which of the following identifies how an astrophysicist is different from an astronomer?
An astrophysicist is more concerned with the laws that govern the origins of stars and galaxies.

An astrophysicist applies physics principles to better understand astronomy.

An astronomer is more concerned with the processes that lead to the creation of stars and galaxies.

An astronomer applies astronomy principles to better understand physics.

Answers

Answer: An astrophysicist is more concerned with the laws that govern the origins of stars and galaxies.

Explanation:

Astrophysicists like Raj Koothrappali in the Big Bang Theory differ from astronomers in that they study the general universe to find out the laws that govern it as well as how it originated and evolved.

Astronomers on the other hand is more specific in their study of the universe and so you will find them focusing on certain planets or galaxies.

Which two contextual tabs help you change the look and feel of SmartArt?

Answers

PowerPoint offers two contextual tabs that enable you to modify the design and format of your SmartArt graphics: the SmartArt Tools – Design tab and the SmartArt Tools – Format tab. Note that these contextual tabs appear only when you have selected a graphic. If they disappear, select your graphic again to view them.

write the algorithms for the problem How to post a letter ? you can put pictures for the steps ​

Answers

❖ Step 1: Start

❖ Step 2: Write a letter

❖ Step 3: Put in envelope

❖ Step 4: Paste stamp

❖ Step 5: Put it in the letter box

❖ Step 6: Stop

\(\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}\) ~←(>▽<)ノ

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

Answers

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

which is true?a.a field can not be initialized in the field declarationb.a default constructor has at least one parameterc.a constructor has no return typed.the java compiler does not initialize fields to their default values

Answers

Java is a high-level programming language that is easy to learn. It is primarily used to create web and mobile applications, but it is also useful for developing other kinds of software. Java has several features that make it unique, such as automatic memory management and platform independence. Java is an object-oriented language, which means that everything in Java is an object. A field can be initialized in the field declaration, and the Java compiler will initialize fields to their default values if they are not explicitly initialized. A default constructor has no parameters, and a constructor has no return type. so, the correct answer is a,b,c and d .

a. A field can be initialized in the field declaration .A field can be initialized in the field declaration. The syntax for declaring a field in Java is:
```
  [= ];
```
You can initialize the field in the declaration by providing a value for the initialization. For example, you can declare and initialize a field like this:
``
int count = 0;
```

b. A default constructor has no parameters
A default constructor has no parameters. A constructor is a special method that is used to create objects. A default constructor is a constructor that is provided by the Java compiler if no other constructor is defined. The default constructor has no parameters, and it initializes all fields to their default values.

c. A constructor has no return type
A constructor has no return type. Constructors are used to initialize the object's state. They are called when an object is created using the new keyword. A constructor does not return a value, not even void.

d. The Java compiler will initialize fields to their default values if they are not explicitly initialized
The Java compiler will initialize fields to their default values if they are not explicitly initialized. This is called default initialization. The default value for a numeric field is 0, for a boolean field is false, and for an object field is null.

To know more about java visit:-

https://brainly.com/question/12978370

#SPJ11

Write a program to calculate the volume of a cube which contains 27 number of small identical cubes on the basis of the length of small cube input by a user.​

Answers

Answer:

This program is written in python programming language.

The program is self explanatory; hence, no comments was used; However, see explanation section for line by line explanation.

Program starts here

length = float(input("Length of small cube: "))

volume = 27 * length**3

print("Volume: "+(str(volume)))

Explanation:

The first line of the program prompts the user for the length of the small cube;

length = float(input("Length of small cube: "))

The volume of the 27 identical cubes is calculated on the next line;

volume = 27 * length**3

Lastly, the calculated volume of the 27 cubes is printed

print("Volume: "+(str(volume)))

Discuss the decidability/undecidability of the following problem. Given Turing Machine , state of and string ∈Σ∗, will input ever enter state ?
Formally, is there an such that (,⊢,0)→*(,,)?

Answers

The problem of determining whether a given Turing Machine (TM) and a string will ever enter a particular state is undecidable. This means that there is no algorithm that can always provide a definitive answer for all possible cases.

To understand why this problem is undecidable, we can map it to the Halting Problem, which is a classic undecidable problem in computability theory. The Halting Problem asks whether a given TM halts or not on a particular input. By encoding the problem of entering a specific state as an instance of the Halting Problem, we can see the undecidability of the original problem.

Suppose we have a TM M and we want to determine whether M will ever enter state q on input w. We can construct a new TM M' that simulates M on input w, but adds an extra step to transition to state q. If M enters state q, M' halts; otherwise, M' continues its simulation indefinitely. By using M' as an input to the Halting Problem, we can determine whether M' halts or not. If M' halts, it means M will enter state q; otherwise, it means M will not enter state q.

Since the Halting Problem is undecidable, the problem of determining whether a TM will enter a specific state is also undecidable. There is no algorithm that can always provide a definitive answer for all possible TMs and strings.

It's worth noting that undecidability does not imply that it is impossible to determine the behavior of a particular TM on a particular input. In practice, for specific cases, it may be possible to determine whether a TM will enter a specific state through analysis, simulation, or other techniques. However, the undecidability of the general problem means that there is no algorithm that can handle all possible cases in a systematic and automated manner.

In summary, the problem of determining whether a given TM and a string will ever enter a specific state is undecidable due to its connection to the undecidable Halting Problem.

Learn more about algorithm here

https://brainly.com/question/13902805

#SPJ11

Jamal is writing a program and wants to be sure that the user will only input a grade level that is 9, 10, 11, or 12. Which of the following should Jamal use so that the user has to keep entering input until they choose 9, 10, 11, or 12?a for loop
a while loop
a nested loop
an array

Answers

To ensure that the user inputs only grade levels of 9, 10, 11, or 12, Jamal should use a while loop so that the user has to keep entering input until they choose 9, 10, 11, or 12.

Explanation:

What is a while loop?

A while loop is a loop that repeats a set of instructions while a particular condition is true. The while loop evaluates an expression and executes the block of instructions as long as the expression is true. If the expression is false, the loop will terminate, and the program will move on to the next line of code.

What is an array?

An array is a collection of data items that are all of the same type, with each item identified by an index or key. It is an object in which you can store multiple values of the same data type. Arrays are helpful when working with large data sets since they enable you to store data in a structured and logical manner.

So, to ensure that the user inputs only a grade level of 9, 10, 11, or 12, Jamal should use a while loop.

Learn more about while loop here:

https://brainly.com/question/15172842

#SPJ11

before you choose any data, you will start by describing to me the theoretical assumptions behind the data you are planning on using

Answers

Certainly! Before choosing any specific data for the program, let's outline some theoretical assumptions that can help guide the selection of data:

Computer Brand and Model: We assume that the user will provide the brand and model of the computer as strings. These can be alphanumeric values that represent the brand name (e.g., "Apple", "Dell", "HP") and the model name (e.g., "MacBook Pro", "Latitude 7400", "Pavilion X360").

Year: We assume that the user will enter the year of the computer as an integer. This represents the manufacturing year of the computer and can be a positive four-digit number (e.g., 2019, 2022).

Input Validation: We can assume that the user will enter valid and reasonable input values. However, it's good practice to include input validation checks to ensure that the entered data is within appropriate ranges. For example, the year should be a positive value and within a realistic range (e.g., not a future year).

Single Computer: For simplicity, we assume that the program will handle information about a single computer. If you want to extend it to handle multiple computers, you may need to consider data structures like arrays or linked lists to store multiple instances of the Computer Type structure.

These assumptions provide a basis for selecting and handling the data in the program. They help define the expected format of the input and the constraints within which the program operates.

Certainly! Before choosing any specific data for the program, let's outline some theoretical assumptions that can help guide the selection of data:

Computer Brand and Model: We assume that the user will provide the brand and model of the computer as strings. These can be alphanumeric values that represent the brand name (e.g., "Apple", "Dell", "HP") and the model name (e.g., "MacBook Pro", "Latitude 7400", "Pavilion X360").

Year: We assume that the user will enter the year of the computer as an integer. This represents the manufacturing year of the computer and can be a positive four-digit number (e.g., 2019, 2022).

Input Validation: We can assume that the user will enter valid and reasonable input values. However, it's good practice to include input validation checks to ensure that the entered data is within appropriate ranges. For example, the year should be a positive value and within a realistic range (e.g., not a future year).

Single Computer: For simplicity, we assume that the program will handle information about a single computer. If you want to extend it to handle multiple computers, you may need to consider data structures like arrays or linked lists to store multiple instances of the Computer Type structure.

These assumptions provide a basis for selecting and handling the data in the program. They help define the expected format of the input and the constraints within which the program operates.

learn more about specific data here:

https://brainly.com/question/28561952

#SPJ11

write 5 ways on how to edit cell in ms excel​

Answers

1. Press Enter. Excel exits edit mode and selects the cell directly below the current cell. 2.Press Tab. 3. Click a different cell. 4. Press F2.

Optimizing a network to handle more traffic by adding new specialized software is an example of ______ scaling. Adding additional nodes to a network is an example of _________ scaling.

Answers

Answer:vertical and horizontal

Explanation:

Answer:

Horizontal and then Vertical

Explanation:

Other Questions
a temporary absence from the taxpayers home for full-time schoolwork by the child may cause the child to fail the qualifying child residence test. True/False The following sentence communicates a(n) __________ tone."Now is the time to lift our national policy from the quicksand of racial injustice to the solid rock of human dignity." (5 points)scoldingdisappointedurgentpassionate Read the passage.I wandered lonely as a cloudThat floats on high o'er vales and hills,When all at once I saw a crowd,A host, of golden daffodils;Beside the lake, beneath the trees,Fluttering and dancing in the breeze.Which lines contain a simile?1 and 23 and 45 and 6 Which is an example of collective bargaining?workers trying to achieve a better price for the goods they produceemployers joining together to support a particular industryunion leaders negotiating on behalf of a group of workersunions trying to persuade employers to hire more workers what is the magnitude of the electric force on an electron in a uniform electric field of strength 2490 n/cn/c that points due east? What are the prospects of development in the terai,hilly and Himalayan regions of nepal? Explain Use slopes and y-intercepts to determine if the lines 6xy=5 and 3xy=4 are parallel. whats good about the Olympics A population of 228 student consist of 160 taster. Allele T and t are for taster. Calculate the frequency of the tasters At a tractor pull, one machine has a pull that produces 27,000 joules of power in 3 seconds. How many watts of power did this tractor produce?3 (56x^2-60x+16)Divided by28x-16 FInd the value of x in each case.pls help i will give 100 points Classify each polygon by its number of sides. Drag the choices into the boxes to correctly classify each polygon.20 points!I need this fast! please help! Describe the advantages that llc and S corporations passed through entitles have relative to c-corporations The perceptual processes whereby individuals can look at a small number of objects and almost instantaneously know how many objects are present is referred to as:A. counting.B. ordering.C. guessing.D. subitizing. solve for x x/45=3:) Why did George Floyd? I need it ASAP plz... These are large nets used for fishing kept upright by weights at the bottom and floats and the top and allowed to move with the tide. Big Data, Apple Pie, and the Future In this unit, you were introduced to various kinds of software, particularly databases. Databases have made it possible to gather and analyze vast amounts of data. The study of that data has led to some surprises, such as the real favorite flavor of pie for most peopleits not what you might think! Watch the video Big Data Is Better Data. After you finish watching the video, answer the following questions: Were you surprised by the pie data? Is it true for you, your family, and your friends? Why or why not? The speaker argues that more data allow us to see new things. Think about your favorite hobbyskateboarding, listening to music, or whatever you most enjoy doing. What kinds of insights could big data provide about your hobby? How might these insights make things better for you? Are there any ways that big data could make your hobby worse? The author mentions several challenges facing the world, including poverty and climate change. How might big data help us solve these problems? Think ofand explainone or more ways that society could use big data, other than the ones mentioned in the video. Think for a moment about the potential problems with big data that the speaker mentioned: Will we treat people unfairly for crimes they havent yet committed? Will most jobs disappear due to automation? Can we protect data from people who shouldnt have it? Choose one of these topics and research it by reading two articles about it. Here are three sources to use to begin your research: Tween Tribune Newsela Channel One News If you are having a difficult time finding what you want, try searching for data privacy, data breach, automation and jobs, crime and technology, or robots and jobs. Include the following in your answer to the question you choose: Screenshots of the two articles that you read The question that you chose to answer Your answer to the question Three reasons that explain your answer to the question; use evidence from your research to support your op Milly's Drive-In's 12 employees earn a gross pay of $2,050 each per month. Milly's Drive-In contributes 8% of gross pay to a retirementprogram for employees and pays an extended medical insurance premium of $50 per month per employee.Required:Prepare the entries to record the employer's payroll costs for the month of March 2018. (assume claim code 1