Assume you're running a query on your orders in the past year. You want to see how many orders were placed after May. What type of query would you use to find this data? A. Select
B. Range
C. Complex
D. Parameter

Answers

Answer 1
Answer:

Your answer is A. Because a query is a question about a an organization to check how it's going



Related Questions

Using for loop . Input an integer and identify whether it's EVEN OR ODD ( without using modulo operator )using only . C++ programming
Presently we can solve problem instances of size 30 in 1 minute using algorithm A, which is a algorithm. On the other hand, we will soon have to solve probleminstances twice this large in 1 minute. Do you think it would help to buy a faster( and more expensive) computer?
How many bits would be needed to count all of the students in class today? There are 5 children in the class.
Jeff types a sentence She wore a new dress yesterday. He erroneously typed w instead of e in the word dress. What is the accuracy of the typed sentence?
Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to another variable call z. Use z for adding 30 into it and print the final result by using variable results.

create a Java program that prompt the user to enter a number of hours, wages, over time factor, then your program should calculate the employee total wages. Make sure your program can calculate the over time and regular wages if number of hours are great than 40 hours. Use 1.5 for over time factor. Make sure your Java code has comments showing declarations and description of your variables.

Answers

Answer:

The program to the given question as follows:

Program:

import java.util.*; //import package for user input.

public class Main //defining class Main

{

public static void main(String[] as) //defining main method

{

final double over_time_factor = 1.5; //define final variable

double number_Of_hours,wages,total_Wages=0; //defining variables  

System.out.println("Enter hours and wages rate:"); //print message

Scanner obc = new Scanner(System.in); //creating Scanner class object for user input

number_Of_hours = obc.nextDouble(); //taking input

wages = obc.nextDouble(); //taking input

if(number_Of_hours>40) //check condition if number_Of_hours greter then 40

{

total_Wages=40*wages+(number_Of_hours-40)*wages*over_time_factor; //calculate value

}

else //else part

{

total_Wages = number_Of_hours*wages; //calculate total_Wages

}

System.out.println("Total Wages: $"+total_Wages); //print value

}

}

Output:

Enter hours and wages rate:

12

3

Total Wages: $36.0

Explanation:

In the above java program, the package is first imported into the user input and then the class is defined and inside this, the main method is defined, that defines a double type final variable "over_time_factor" is defined that holds a value "1.5", Then double type variable is defined that are " number_Of_hours, wages, and total_Wages", in which first two variables are used for taking input from the user and the third variable is used to calculate their values. After taken input from the user, the conditional statement is used that can be defined as follows:

  • The if block, checks the variable "number_Of_hours" value is greater than 40 it will calculate over_time_factor value that is held by total_Wages variable.  
  • In else block, it will multiply the user input value that is store in total_Wages variable.  
  • At the end of the conditional statement, the print function is used that prints total_Wages variable value.  

In the glare of the sun, it is hard to see and be seen. Name six precautions

Answers

In the glare of the sun, it is hard to see and be seen. Some precautions would be :
1) 
Have a polarized sunglasses ready, they can help reduce glare.
2) Use your sun visor – it can help to block out the sun. 
3) Leave more following space between you and the next vehicle. 
4) Drive with your headlights on to increase your visibility to other drivers. 
5) Keep your windshield clean, inside and out, avoid storing papers or
     other items on the dashboard. 
6) If having a difficult time seeing the road, use the  lane markings to help
     guide you.

You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?

Answers

Answer:Encryption is the process

of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.

Types of encryption

1.Symmetric encryption :This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.

2.Asymmetric encryption :This is foundational technology for SSL(TLS)

How encryption is being configured

Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.

Explanation:

An attacker is intent on disturbing the communication by inserting bogus packets into the communications. A. Discuss whether such an attack would succeed in systems protected by IPsec.
B. Discuss whether such an attack would succeed in systems protected by SSL.

Answers

Answer:

A. No, it would not succeed.

B. Yes, the attack will succeed.

Explanation:

In the seven-layer OSI model of computer networking, packet strictly refers to a protocol data unit at layer 3, the network layer. So if an attacker wants to insert bogus/ fake packets this will happen at the network layer.

A. IPSec works on network layer (the IP layer) of the OSI model protecting and authenticating IP packets. It provides data integrity, authentication and confidentiality between participating peers at the IP layer.

Thus, inserting bogus packets into the communications by an attacker will not have any affect on security of a system which has IPSec security and therefore it will not succeed.

B. SSL/TLS is an application layer protocol that fits into layer 5 to 7 of the OSI model. However, an attack by inserting bogus packets into the communications will succeed as SSL only provides protection for layer 5 to 7 and not the network layer.

Please help I’m on a timer!!! Arie is moving icons around and deleting shortcuts. He is working on the _____.A. All programs submenu
B. Start menu
C. System tray
D. Desktop Arie is moving icons around and deleting shortcuts. He is working on the _____.
A. All programs submenu
B. Start menu
C. System tray
D. Desktop

Answers

Answer:

D. Desktop

Explanation:

If he's moving icons around and deleting shortcuts, he has to do that at the desktop.

1. What are the advantages and disadvantages of technology in communication?

Answers

The advantages and the disadvantages of the communication with the used of the technology are: Quickly communicate and the lack of privacy.

What is communication?

The term communication refers to the exchange of thoughts, ideas, and messages that are shared between two or more people. Without language, a person can survive, but without communication, no one can survive. Communication is divided into two categories, such as interpersonal and intrapersonal.

Advantages of the communication with the used of the technology are:

  • Quickly communicate.
  • Easy to used.
  • Managed the data and share the data easily.

Disadvantages of the communication with the used of the technology are:

  • Privacy issues.
  • Hacking Data.
  • They recover the data all the time not to the easy.

Hence, the significance of the communication are the aforementioned.

Learn more about on communication, here:

brainly.com/question/22558440

#SPJ2

Answer:

ADVANTAGES:

First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.

2-Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks

DISADVANTAGES:

1-Lack of Privacy. You might think that a quick text or IM offers more privacy than a telephone call in a crowded room. ...

2-Distraction from Real Life. ...

3-Potential for Misunderstanding. ...

4-Decline of Grammar and Spelling...

5- Near people are far and far people are near through communication technology. we have no time to sit with our relatives but constantly communicate far away people . I think this is biggest disadvantage

Explanation: