describe three sql queries to provide information to the end users for this system. at least one must be a join. these can be real sql statements or written in english.

Answers

Answer 1

The required three SQL queries are as follows:

"SELECT sessionnum, sessiondate, patientnum, lengthofsession, therapistid, therapycode FROM session": This query will return all columns of information for every session in the session table."SELECT sessiondate, therapycode, COUNT() FROM session GROUP BY sessiondate, therapycode": This query will return the number of sessions for each combination of session date and therapy code. It uses a "GROUP BY" clause to group the results by the session date and therapy code, and the "COUNT()" function to count the number of sessions in each group."SELECT patient.patientnum, patient.patientname, session.sessionnum, session.sessiondate, session.therapistid FROM patient INNER JOIN session ON patient.patientnum = session.patientnum": This query uses a join to combine information from two tables, the patient table and the session table. The join is based on the common field of patientnum, which appears in both tables. The query returns the patient number, patient name, session number, session date, and therapist ID for each session.

To know more about SQL queries visit:

https://brainly.com/question/30325253

#SPJ4


Related Questions

what can an idps check to try to determine whether a packet has been tampered with or damaged in transit

Answers

An Intrusion Detection and Prevention System (IDPS) can use a variety of techniques to try to determine whether a packet has been tampered with or damaged in transit.

What is the transit?

Transit is the term used to describe the movement of people, goods and services from one place to another. It covers all forms of transportation including public transportation such as trains, buses, and subways, as well as private transportation such as taxis, rideshare services, and bike sharing programs. Transit is an important part of a city or region's infrastructure, since it provides access to jobs, educational opportunities, and other vital services. Transit can include walking, biking, and using personal vehicles, as well as using public transportation. By providing people with different options for getting around, transit can help make cities and regions more livable and accessible.

To learn more about transit

https://brainly.com/question/30094890

#SPJ4

illustration of eight peripheral device connector types labeled a through h from left to right. you have purchased a new led monitor for your computer. on the back of the monitor, you see the following port (pictured below). which type of cable should you use to connect the monitor to your computer?

Answers

A display port cable should be used to connect the monitor to your computer.

The display port is an audio and video interface standard. It was intended to replace older video interfaces like DVI and VGA, Display port is used by computers, laptops, and projectors. The voltage requirement of the display port is 3.3 volts.

The display port protocol is used to transmit high-definition video with the use of a thunderbolt connector.

A display port is a cable and connector used to stream video, audio, or other kinds of data to the monitor screen of a computer.

Learn more about display port at:

brainly.com/question/28542038

#SPJ4

you are reviewing new ram to purchase for a gaming computer and find three different ram modules that are the same except for their cl rating. the memory with which rating will work best? group of answer choices cl15 cl18 cl20 they will all perform at the same speed.

Answers

shows many RAM modules that are identical besides CAS Latency as having a 15 ns CL.

What kind of memory feature will be necessary if data accuracy is crucial for a new computer?

Computer data storage that is capable of spotting and fixing the most prevalent forms of internal data damage is known as error-correcting code memory (ECC memory).

Which RAM includes an additional layer of security?

A memory chip that serves as both error detection and correction for the other eight RAM chips distinguishes ECC memory, also known as ECC RAM. Though slightly more expensive than non-ECC RAM, the additional security it offers is crucial as applications become more reliant on huge volumes of data.

To know more about RAM modules visit :-

https://brainly.com/question/28776521

#SPJ4

we now review k-fold cross-validation. (a) explain how k-fold cross-validation is implemented. (b) what are the advantages and disadvantages of k-fold crossvalidation relative to: i. the validation set approach? ii. loocv?

Answers

K-fold cross-validation splits training data into k parts, trains k-1 times, tests 1 time, averages results for performance estimation, better than validation set, less accurate but more efficient than LOOCV.

(a) K-fold cross-validation is a technique used to assess the performance of a machine learning model. It is implemented by dividing the original training dataset into k folds (or subsets) of equal or nearly equal size. The model is then trained on k-1 folds and evaluated on the remaining fold. Once for each fold to act as the validation set, this process is repeated k times.The performance metric is then averaged over the k iterations to obtain an overall measure of model performance.

(b) Advantages and disadvantages of k-fold cross-validation relative to:

i. Validation set approach: The main advantage of k-fold cross-validation over the validation set approach is that it provides a better estimate of model performance by averaging the results over multiple iterations. In the validation set approach, the performance is estimated using only a single validation set, which can be subject to a large amount of variability depending on the randomly selected validation set.

ii. LOOCV: The main advantage of k-fold cross-validation over LOOCV is that it is computationally more efficient. LOOCV requires training the model k times, once for each sample in the dataset. This can be computationally expensive and time-consuming, especially when the dataset is large. On the other hand, k-fold cross-validation trains the model k times, but each iteration uses a smaller validation set, reducing the computational cost. The main disadvantage of k-fold cross-validation is that the performance estimate may be less accurate compared to LOOCV, especially when the dataset is small or when the model is complex. This is because the model may perform differently on each of the k validation sets, leading to a higher variance in the performance estimate.

Learn more about k-fold here:

https://brainly.com/question/29108755

#SPJ4

which type of application that acts as an interface to the database is used to perform most sql injections?

Answers

Most SQL injections are preformed through a(n) web application that acts as an interface to the database is used to perform most sql injections

SQL injection, also referred to as SQLI, is a popular attack method that makes use of malicious SQL code to access information that wasn't meant to be displayed by backend databases. This data could include anything from user lists to private customer information to sensitive company data.

A business could experience wide-ranging effects from SQL injection. A successful attack may result in the unauthorized viewing of user lists, the deletion of entire tables, and, in some circumstances, the attacker obtaining administrative rights to a database, all of which are extremely harmful to a business.

The loss of customer confidence must be taken into account when estimating the potential cost of an SQLi should contact information like phone numbers, addresses, and credit card

To know more about  SQL here

https://brainly.com/question/25694408

#SPJ4

why are many computers, especially ultraportable ones, using ssds instead of traditional magnetic hard drives?

Answers

Utilizing SSDs rather than conventional magnetic hard drives in laptops, notably ultraportable ones due to the speed and reduced space requirements of SSDs.

Which keyboards are ergonomically suited to the human body and made to be comfortable?

Any keyboards created to lessen physical stress from typing are referred to as ergonomic keyboards. These keyboards are frequently designed so that you may type while resting your hands in a more cozy, natural position.

What benefit does using helium hard drives have over conventional hard drives?

Higher storage capacity, reduced power consumption, and improved reliability are just a few of the many advantages of adopting a helium-filled hard drive.

To know more about SSDs  visit :-

https://brainly.com/question/30121535

#SPJ4

embedded systems commonly deal with 1-bit data items. c does not have a 1-bit data type, which is unfortunate so what variable data type is used in simulation?

Answers

In simulation, a char data type is typically used to represent a 1-bit data item.

What is the data ?

Data is information or facts that can be analyzed and used to draw conclusions or make decisions. It can be presented in a variety of formats, including numerical, textual, graphical, audio, and video. Data can be collected from a variety of sources, including surveys, interviews, experiments, and online activities. Data can be used to measure, monitor, and predict outcomes, analyze trends, and inform decisions. Data can also be used to support research, evaluate programs, and inform policy. Data can also be used to tell stories and create visualizations. Data is an important component of evidence-based decision making and can be used to inform policy, practice, and research.

To learn more about data

https://brainly.com/question/30036010

#SPJ4

Under what circumstances would you try and push as much local processing as possible onto the client in a client-server architecture

Answers

Pushing processing to the client makes sense when local input needs to be processed (data validation), when client interfaces need to be updated more frequently than the server, when the client needs to regularly perform specialized tasks or use specialized views, and in other situations.

The client/server architecture that serves as the cornerstone of cooperative processing will be covered in this article. Demands on the sources' interoperational capacity, the growth of source sizes, and the growth of the client base are the three main determinants of the application of client/server architecture.

In addition to the fundamental variations in the architecture, the potential for multi-disk applications and cache memory on the customer side will also be taken into account.

To know more about client/server architecture here

https://brainly.com/question/28423541

#SPJ4

a malicious user sniffed credentials exchanged between two computers by intercepting communications between them. what type of attack did the attacker execute?

Answers

A Man-in-the-Middle attack. A man-in-the-middle (MITM) attack occurs when a perpetrator inserts himself into a dialogue between a user and an application, either to listen in on the conversation or to pose as one of the parties, giving the impression that regular information flow is taking place.

A Man-in-the-Middle , broadly speaking, is comparable to a mailman examining your bank statement, noting your account information, then resealing the envelope and bringing it to your door.

Interception and decryption are the two independent stages of a successful Man-in-the-Middle operation. Interception-Before it reaches its destination, the initial stage involves intercepting user traffic that is traveling across the attacker's network. in Man-in-the-Middle attack.

By distributing free, malicious WiFi hotspots to the general population, an attacker can carry out a passive attack, which is the most typical (and straightforward) method of achieving this. They usually don't have password protection, and their names usually match where they are. When a victim connects to one of these hotspots, the attacker has complete access to any online data transfer.

To know more about Man-in-the-Middle:

brainly.com/question/13014110

#SPJ4

when using dry developer, the drying operation must be performed. True or false?

Answers

This answer is true

which option is the routing extension header currently designed to use? question 14 options: routing flow label

Answers

Routing address=0 option is the routing extension header currently designed to use.

What are trade routes?

A trade route is a logistical network comprised of a number of roads and rest areas that are used to transport goods for profit. Trade over bodies of water is another usage of the phrase. A single trade route has long-distance arteries that can connect to smaller networks of commercial and noncommercial transit routes, enabling commodities to reach distant markets. The Amber Road, which provided as a solid network for long-distance trade, was one of the significant trading routes. When governments turned to military tactics to dominate this important channel during the Middle Ages, maritime trade along the Spice Route became significant. Organizations like the Hanseatic League, which aimed to safeguard the interests of traders and trade, rose to prominence during the Middle Ages.

To know more about trade routes, visit:

https://brainly.com/question/13726553

#SPJ4

if indirect access to sensitive data can be achieved through a system, what should be considered when evaluating the critical system functionality?

Answers

Consider access control, data protection, data retention, incident response, third-party risk, and monitoring/audit when evaluating critical system functionality with indirect access to sensitive data.

When evaluating the critical system functionality where indirect access to sensitive data can be achieved, the following should be considered:

Access control: Evaluate the access control mechanisms in place to ensure that only authorized users can access the sensitive data. This includes authentication and authorization processes, as well as any restrictions on the types of actions users can perform.

Data protection: Assess the security measures in place to protect the sensitive data from unauthorized access, such as encryption and data backup procedures.

Data retention: Evaluate the data retention policies and procedures to ensure that sensitive data is not retained for longer than necessary and is disposed of securely when no longer needed.

Incident response: Evaluate the incident response plan and procedures to ensure that the system is able to detect and respond to potential security incidents in a timely manner.

Third-party risk: Assess the risks associated with any third-party systems or services that have indirect access to the sensitive data, including the security measures in place to protect the data.

Monitoring and audit: Evaluate the monitoring and audit mechanisms in place to detect and investigate any unauthorized access to the sensitive data.

By considering these factors, organizations can better understand the risks associated with indirect access to sensitive data and take steps to ensure the protection of the data and the critical system functionality.

Learn more about Third-party risk here:

https://brainly.com/question/30030111

#SPJ4

In asynchronous learning, teachers provide a learning progression and the necessary resources for students to engage in the learning at their own pace and time. Which of the following statements about asynchronous learning is FALSE?


1. students are responsible for managing their own time

2. students can work whenever they want during the day

3. students do not have due dates for their work

4. students can work from home, the public library, or any other location

Answers

Students do not have due dates for their work.

What is Asynchronous learning?

Asynchronous learning allows you to learn on your own schedule, within a certain timeframe. You can access and complete lectures, readings, homework and other learning materials at any time during a one- or two-week period.

“A big benefit to asynchronous classes is, of course, the flexibility.  Asynchronous online classes mean that you don’t always need to be online at the same time as your instructor or classmates,” said Instructional Designer John Muir, who works with faculty to develop classes for Ohio State's online programs.

Online asynchronous classes might include short videos teaching key concepts that you can watch over and over again, if necessary.

Therefore, Students do not have due dates for their work.

To learn more about asynchronous learning, refer to the link:

https://brainly.com/question/15969260

#SPJ6

one of the basic purposes of design features is to make a document attractive. what is another purpose mentioned in the unit?

Answers

Another purpose of design features in a document is to improve its readability and overall usability.This includes using appropriate font sizes and styles, organizing information in a clear and logical manner.

Explain Design features in documents?

Design features in documents serve to improve readability, clarify information, and guide the reader's attention. They include font styles and sizes, organization, images and graphics, white space, and tone-conveying elements. These elements work together to make the document visually appealing and easily understandable.

Design features also help to convey the intended tone and message of the document, and to guide the reader's attention to the most important information.

To learn more about design features, visit: https://brainly.com/question/9856029

#SPJ4

____ is implemented when you display the values of variables used in the program that document the program flow. They can help identify errors in how input is processed.

Print debugging
Automated testing
A test case
A customer satisfaction survey

Answers

Print debugging is implemented when you display the values of variables used in the program that document the program flow.

Answer:

Print Debugging!!

Explanation:

How do web search tools make it more efficient to find information?

Answers

A public body, such a government, may organize and operate a library, which might range greatly in size.

Web search engines are the best option for finding current information, library discovery tools are the best option for discovering what materials a particular library holds, and indexes are the best option for discovering academic journal articles and books. A search engine is a program designed specifically to conduct online searches. They carry out methodical searches of the World Wide Online in pursuit of the exact information indicated in a text-based web search query. The way the search results are normally shown is on search engine results pages, as they are commonly called. A library is a collection of things like books or videos that can really be used as opposed to just being presented. People can borrow books in print copy or digital format from a library. Virtual environments can also be libraries.

Learn more about A search engine here:

https://brainly.com/question/29312308

#SPJ4

Where on a computer is the operating system stored?

Answers

The operating system is stored on a component defined as a hard drive called an internal hard drive. The operating system is stored on the hard disk, but it should be noted that to speed up the whole process, the Operating System is copied into RAM on start-up. This is process is completed by BIOS i.e., Basic Input Output System.

Thereby, the operating system is not required to be loaded from discs each time the computer is started. These processes and applications are accessed from the drive and pulled to RAM when needed by the user.

Learn more about operating system at:

brainly.com/question/22811693

#SPJ4

is there a way to prevent commercials (ads) on your amazon fire hd 8 kids pro tablet when playing snake.io?

Answers

Navigate to Manage Your Content and Devices. Decide on your device after choosing Devices. Choose Remove (ads) from Special Offers from the menu. Next, the cost to remove adverts is shown in a pop-up window.

Can the free Fire tablet be used without ads?

Ads themselves being removed from the Fire Tablet From this menu, choose Apps & Notifications. In this new window, move the cursor down and touch Home Screens. Switch off the Recommended Row and Continue buttons next. The Home screen of the Fire tablet will thereafter be devoid of any advertisements once that is finished.

Do advertisements appear on Fire HD 8 for kids?

The kid-friendly Fire HD 8 model doesn't come with adverts by default, which is probably the finest feature.

To know more about window (ads)  visit :-

https://brainly.com/question/2407671

#SPJ4

question 1 a is the hardware where data is actually stored. a. storage device b. storage processor c. storage medium d. storage memory

Answers

The hardware where data is actually stored on: a. storage device.

Data is kept in a computer's primary storage, sometimes referred to as main storage or memory, for easy access by the CPU. Random access memory (RAM) and memory are frequently used interchangeably to refer to primary or main storage. A piece of hardware known as a storage device is used primarily to store data. Any desktop, laptop, tablet, or smartphone will have a storage device of some sort.

Learn more about storage device:https://brainly.com/question/28346495

#SPJ4

which small hand tool for boring holes is also used to describe a piercing stare?

Answers

A screwdriver that can change its tip or other characteristics fast is known as a convertible screwdriver.

Drilling machines are portable tools that use rotating drill bits to make holes in a range of materials. To make holes in solid items like walls, wood, etc., a drilling machine is an electronic tool. Given that it contains a button and a mouth that can hold metal rods of various sizes, this device resembles a rifle. They are used to making holes. This machine should be used carefully because if you are not careful, it could hurt you. Therefore, drilling machines are portable instruments that create holes in a variety of materials using rotating drill bits. A screwdriver that can change its tip or other characteristics fast is known as a convertible screwdriver

Learn more about Drilling machines here:

https://brainly.com/question/28393269

#SPJ4

1 what advantage does a circuit-switched network have over a packet-switched network? what advantages does tdm have over fdm in a circuit-switched network

Answers

A circuit-switched network has the advantage of guaranteeing a dedicated, continuous, and constant bandwidth for the entire duration of a call or connection. TDM (Time Division Multiplexing) has the advantage over FDM (Frequency Division Multiplexing) in a circuit-switched network by providing a more efficient use of bandwidth.

This makes it suitable for real-time communication services such as voice and video calls, where even small delays or loss of data can negatively impact the quality of the communication.  In TDM, each channel is assigned a specific time slot, and the multiplexer switches between channels to transmit data, while in FDM, each channel is assigned a specific frequency band. TDM is generally more efficient than FDM as it can support more channels on a single transmission link and enables dynamic allocation of bandwidth as needed.

Here you can learn more about switched network

brainly.com/question/14748148

#SPJ4

how would a system administrator add an additional layer of login security to a user's aws management console?

Answers

To add an additional layer of login security to a user's AWS Management Console, enable multi-factor authentication.

An extensive array of service consoles for managing AWS resources are included in and referred to by the AWS Management Console, a web application.

You see the console home page when you first log in. You can access each service console from the home page, which also offers a single location to access the data you need to carry out tasks related to AWS. By adding, deleting, and rearrangeing widgets like Recently visited, AWS Health, Trusted Advisor, and others, you can further personalize the Console Home experience.

Additionally, there is an Android and iOS app for the AWS Management Console. This app offers mobile-optimized tasks that work well with the full web experience. For instance, managing your current Amazon EC2 environment is simple.

To know more about login security here

https://brainly.com/question/25720881

#SPJ4

most of today's microprocessors have several processors, or ____ inside a single chip

Answers

In the past, the central processing unit was large, expensive, and produced a lot of heat.

The first choice, multicore CPUs, typically only use one core at a time to execute older software. The following problem is encountered by multicore processors running older software written for specific memory chips at the same time since multicore processors often run older apps only by a single core. It is the core that has joined two or more processors in order to increase productivity, consume less energy, and more effectively integrate several tasks. A computer system's CPU is its mental center. It has several chips to quickly process the data as well as a cache memory to store the data that needs to be processed. A bus line also carries the data to the processing unit.

Learn more about CPU here:

https://brainly.com/question/14410487

#SPJ4

This concept is used to describe how to modify your own particular exercise program. a. Principle of reversibility b. FITT principle c. Logic of progression

Answers

The concept which is used to describe how to modify your own particular exercise program is termed as b. FITT principle.

What is FITT principle?

FITT is an acronym used in exercise and fitness, it stands for:

Frequency: How often you perform the exerciseIntensity: How hard you perform the exerciseTime: How long you perform the exerciseType: The type of exercise you perform

The FITT principle is used to design safe and effective exercise programs, and it helps ensure that individuals are engaging in a balanced, well-rounded workout regimen.

By considering the FITT principle, you can optimize the benefits of your exercise program and reduce the risk of injury. The frequency, intensity, time, and type of exercise you choose will depend on your personal fitness goals, current fitness level, and any health conditions you may have. Regularly adjusting the FITT components can help you progress and avoid plateaus in your fitness journey.

To learn more about Program, visit: https://brainly.com/question/23275071

#SPJ1

which of the following is a gui object that provides an interface for collecting, displaying, and delivering information and that contains other controls? a. form b. button c. label d. textbox

Answers

Users may interact with electronic gear using graphical icons and sounds using the GUI, or graphical user interface.

Do GUI elements offer a means of acquiring, exhibiting, and disseminating knowledge?

Form is a GUI item that includes other controls and offers an interface for gathering, displaying, and transmitting information.

Which of these allows users to connect to remote computers using a graphical user interface (GUI)?

RDP, or the remote desktop protocol, is a proprietary technology that was first developed by Microsoft and enables two computers to communicate via a standardized network connection while exchanging a graphical user interface (GUI).

To know more about GUI visit:

https://brainly.com/question/14407410

#SPJ4

in the set of tables for the following uml class diagram, how many foreign keys would be posted in the production steps table?

Answers

Two foreign keys would be posted in the production steps table of the set of tables for the subsequent uml class diagram.

What are class diagrams in UML?

In software engineering, a class diagram in the Unified Modeling Language is a form of static structural diagram that reveals the classes, their properties, operations, and relationships between objects to explain the structure of a system.

How may a many-to-many relationship be created in a class diagram?

With an association that specifies a many cardinality in the multiplicity constraints of both ends of the association, the many-to-many relationship will be modeled. We may model relationship attributes using UML by displaying an association class that is joined to the association by a dotted line.

To know more about uml class  visit :-

https://brainly.com/question/30030480

#SPJ4

which option is the first process that runs once a computer is powered on and the cpu loads the bios?

Answers

Once a computer is powered on, the CPU loads the Basic Input/Output System (BIOS), and the first process that runs is the Power-On Self Test (POST).

The BIOS runs a series of diagnostic tests during the POST to make sure all of the computer's hardware is in good working order. Checking the RAM, hard disc, keyboard, and other crucial components is part of this process. The BIOS shows an error message outlining the problem if any faults are found during the POST. Following the POST, the BIOS searches the hard drive for an operating system and, if one is discovered, hands off control to the boot loader, which loads the operating system into memory. The operating system then assumes control and starts loading the essential software components, including device drivers, to eventually display the desktop or login screen.

learn more about hardware here:

brainly.com/question/15232088

#SPJ4

voice over internet protocol (voip) is used to route traffic starting and ending at conventional public switched telephone network phones. a. true b. false

Answers

The given statement is true.

Voice over Internet Protocol (VoIP) can be used to route traffic that starts and ends at conventional public switched telephone network (PSTN) phones. VoIP technology allows for the transmission of voice and multimedia communication over the internet, instead of traditional circuit-switched telephone networks. With the help of a gateway device, VoIP can be used to connect a conventional PSTN phone to the internet, allowing the phone to make and receive calls over the internet.In this setup, the gateway acts as a bridge between the PSTN network and the internet, converting the analog signal from the PSTN phone into a digital signal that can be transmitted over the internet.

To know more about networks visit:

https://brainly.com/question/29453075

#SPJ4

computer networks, database systems, point-of-sale (pos) systems, etc., are few examples of information technologies that support information systems in

Answers

Information systems are the equipment, software, and hardware that support retailers in thriving in a changing environment.

What is a management information system's software component?

Input, output, and memory devices are included in a management information system's (MIS) software components. Input, output, and memory devices are among the hardware elements of the management information system (MIS), and they differ depending on the organization and the application.

What are networks on computers?

Computer networking is the term for a network of connected computers that may communicate and share resources. These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols. Here are some frequently asked questions about computer networking.

To know more about information systems visit:

https://brainly.com/question/28363906

#SPJ4

refers to individuals' control over the collection, storage, access, and reporting of their personal data. group of answer choices data privacy confidential data anonymous data data security

Answers

Data privacy refers to individuals' control over the collection, storage, access, and reporting of their personal data.

The right of access, also known as subject access, entitles people to a copy of their personal data as well as additional supporting documentation. People can use it to check that you are using their data legally and to better understand how and why you are using it. The Data Protection Act is significant because it gives organizations and the government best practices guidelines.

Learn more about Data privacy:https://brainly.com/question/27034337

#SPJ4

Other Questions
if a country had personal consumption expenditures of $50 billion, purchases of stocks and bonds and $30 billion, net exports are -$10 billion, government purchases are $20 billion, sales of secondhand items are $8 billion, and gross investment is $25 billion. what is the gdp for this year? Some CPAs and non-CPAs form a partnership to practice public accounting. Which, if any, of the following would be permitted or required by the AICPA for such a partnership?A. A non-CPA banker who will be an owner will not be actively engaged in the practice. He is providing the financing to get the partnership formed and operating.B.Non-CPA owners, other than the banker, who are actively engaged as members of the firm would have to complete the same number of work-related CPE requirements as the CPA members.C.Non-CPA owners could have the title 'partner'.D.All of the above would be permitted or required by the AICPA.E.None of the above would be permitted or required by the AICPA. Indicate which situations would require Zenda Company to record revenue in the current period. (Select all that apply.)a. Zenda is paid in advance for services to be performed in the next period.b. Zenda signs a contract with a customer to perform services in a future period.c. Zenda performs services for cash.d. Zenda performs services on account. can you please tell me 33/55 as a decimal? what is the term designated in the textbook for a philosophy of life, a set of beliefs and principles that helps us make sense of our lives, the cosmos, and our place in it? Read and analyze the following statements given. Tell if the statement is true. If not, change the underlined word(s) to make it true._____________ 1. A wedge is a modified inclined plane._____________ 2. A single wedge comprises only one inclined plane._____________ 3. An axe is a wedge composed of a single inclined plane._____________ 4. The narrower the wedge is, the sharper it gets._____________ 5. More effort is applied to a sharp wedge to split an object._____________ 6. A wedge changes the direction of the force that is applied to it._____________ 7. A door stopper is a wedge used to cut an object._____________ 8. A wedge can also hold an object in its place._____________ 9. A wedge with a shorter and wider tip requires less effort to do its work._____________ 10. A double wedge is composed of two inclined planes put side-to-side to form a sharp edge. WHOEVER ANSWERS FIRST GETS BRAINLIST You have $100 and a bank is offering 5% interest on deposits. If you deposit the money in the bank, how much you will have in one year? T/F most of the major ethical theorists have assumed that women are morally inferior to and less rational than men. Among the given alternatives, which one is not the major right for stockholders?Select one:a.The right to taking money without any legal basis for their personal uses.b.The right to receive a proportionate part of any dividend.c.The right to receive a proportionate ownership in the corporation.d.The right to maintain ones proportional ownership in the corporation. which possibility would have a large impact on the environment?(1 point) responses a population of robins compete for food a population of robins compete for food a nest of robin eggs is abandoned a nest of robin eggs is abandoned a single robin dies a single robin dies a population of robins die Which of the following is usually true for people who have high levels of communication apprehension?a. They love giving presentations to large groupsb. They usually faint within the first minute of their speechc. They tend to procrastinate when preparing speechesd. They do not get nervous before giving a speech 3.1 Area under the curve, Part I: Find the probability of each of the following, if Z~N( = 0, = 1).(please round any numerical answers to 4 decimal places)a) P(Z < -1.35) = b) P(Z > 1.48) = c) P(-0.4 < Z < 1.5) = d) P(| Z | >2) ____: one party to a lawsuit may request that the other party produce all documents that are relevant to the case before trial. The majority of cellular respiration takes place in the nucleus of cells.True or false you are using two tables in your query: customers and orders. you want to view all of the orders each customer has placed. you must include the customer id field to display your information correctly. from which source should the customer id field be added to your query? what are the suggestions related to the designing of navigation controls to prevent the user from making mistakes? each correct answer represents a complete solution. choose all that apply. how does the value of a panamanian balboa compared to that of a us dollar and why is this so? solve the right triangle!!! a patient arrives at the emergency department experiencing a headache and rates the pain as 7 on a 0 to 10 pain scale. which nonpharmacological intervention does the nurse implement for this patient while awaiting orders for pain medication from the health care provider? group of answer choices