Which CPU sockets are supported by the motherboard and are the least expensive? (Select two.) 17-975, 3.33 GHZ, 8MB Cache, LGA1366 AMD Phenom II X4 940 Black Edition Intel Pentium 4 Processor 662 Intel Core 2 Duo Processor E6300 i7-930, 2.80 GHZ, 4MB Cache LGA1366
CIS 115: Databases Chapter Two Applied Assignment 1 This assignment is a learning activity. You can use your textbooks, notes, and completed exercises. Some students find it helpful to refer back to the Lessons/Tutorials from this course, or to use an Internet search of skills to help complete these exercises. Students may also seek help from classmates or tutors on this assignment, but each student is expected to complete their own work. Sharing of files is NOT allowed and is considered a violation of the Academic Honesty Policy. Anytime these instructions refer to your name, replace that with your actual name. The questions and answers included in this assignment are to help you understand important concepts from this chapter. They do not need to be answered as part of the assignment. Prepare: Make sure you are working with a PC with Microsoft Access installed. This means you will NOT be able to use a Mac or Chromebook for this activity. Computers with the correct software are available in the Achievement Center and Library on campus. Microsoft Access is available to students for FREE – refer to the instructions for obtaining your FREE Microsoft 365 subscription and FREE downloads of Office 2019 – including Microsoft Access – in the first course Module. Download the file named DBChapterTwoStartingFile.accdb to your computer. Before you open the file, rename it to YourLastName_StudentsTeachers.accdb. Scenario: You are working with a database to track students and teachers at your elementary school. Tasks: Open a Microsoft Access Database. 1. Open Microsoft Access and the file named YourLastName_StudentsTeachers.accdb. Rename and view existing tables 2. Rename the tables as follows: Student → YourLastName_Student Teacher → YourLastName_Teacher Question: View the two tables in datasheet view and decide which field in the YourLastName_Teacher table is related to which field in the YourLastName_Student table. Answer: The “Class Number” field is located in both tables. When you enter a student’s information into the YourLastName_Student table, you will enter a class number. Once you enter that number, if a relationship is established correctly between the Class Number in the two tables, the database will know the name, address, hourly rate, and year-to-date earnings for the assigned teacher. Therefore, we need to establish a relationship between the Class Number field in the YourLastName_Teacher table and the Class Number field in the YourLastName_Student table. St. Clair County Community College CIS 115: Databases Chapter Two Applied Assignment 2 3. Close both tables. You will not be able to establish relationships between these tables if they are open. Create a relationship between the two tables. 4. Using Database Tools, Relationships, establish the relationship between the Class Number field in the YourLastName_Teacher table and the Class Number field in the YourLastName_Student table. Enforce Referential Integrity in your relationship. Question: What does enforcing referential integrity accomplishes in this example? Answer: Referential integrity ensures that “bad data” won’t be entered into the database. In this case, enforcing referential integrity means that you won’t be able to assign a student to a teacher that doesn’t already exist in the database. Question: How did the database know this was a One-to-Many relationship, and what does that mean for this database? Answer: Whenever you make a relationship between a field that IS a primary key and another field which is NOT a primary key, it is a one-to-many relationship. In this example, it means that each teacher will be listed only one time in the Teacher table, but a teacher can be assigned to many students in the Student table. Finalize the Database 5. Close the relationships window, saving the layout when prompted. 6. Close the database, choosing yes to any prompts to save. Submission Instructions: Return to the Online Classroom assignment and upload the following file(s) for grading. YourLastName_StudentsTeachers.accdb
How is the logo for a popular sportswear company protected? A) by a copyright B) by a patent C) by a trademark D) by a trade secret
How can a LAN be changed into a WAN? A) Connect every device in your household to the same network (phones, computers, tablets, and printers). B) Include a printer on the network. C) Connect several LANs from different geographical locations. D) Add wireless devices to the network.
In reference to computers, what is a firewall? A) letters, numbers, and special characters assigned to unlock accounts and websites B) email attachments C) an installed software element that protects and monitors incoming and outgoing data D) a second copy of files saved to a cloud
A hacker wants to gain illegal Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next to Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next passwords for a popular online website. Where should they direct their attack? A. a bank B. a server C. a removable USB drive D. a laptop
You have been using your Microsoft cordless mouse for a year but it suddenly stopped working. You did not install the mouse software (driver) from Microsoft when you got the mouse because you did not care about using custom features. You have been using the generic mouse software for Windows. List all of the troubleshooting steps you would do before declaring that the mouse is defective.
Can someone help me out with a code. Code's in python write a function that returns the longest common prefix of two strings. For example, the longest common prefix of distance and disinfection is dis. The header of the method is: def prefix(s1, s2) If the two strings have no common prefix, the method returns an empty string. Write a main function that prompts the user to enter two strings and displays their common prefix. here's what I have currently but its not working. def longestCommonPrefix(self, arr): arr.sort(reverse = False) print(arr) n= len(arr) str1 = arr[0] str2 = arr[n-1] n1 = len(str1) n2 = len(str2) result = "" j = 0 i = 0 while(i <= n1 - 1 and j <= n2 - 1): if (str1[i] != str2[j]): break result += (str1[i]) i += 1 j += 1 return (result)
Solve The Two Ciphers – That Is, Determine The English Cleartext From Which The Ciphertext Was Derived. 1. Gh Dt Rgbanygr. Shzznivbnr Iya Cidwzt, Meh Eifn Wyrpwona Dn Gh Mowgn Gewr Jhhu. 2. "Ea Qu Nmj'l Ojmq Qxuvu Qu'vu Rmejr, Wjg Vmwn Qeii Nm" I Am More Interested In How You Solved The Ciphers Than The Actual Answers (Which I Already Know). Please This question hasn't been solved yet Ask an expert Solve the two ciphers – that is, determine the English cleartext from which the ciphertext was derived. 1. Gh dt rgbanygr. shzznivbnr iya cidwzt, meh eifn wyrpwona dn gh mowgn gewr jhhu. 2. "Ea qu nmj'l ojmq qxuvu qu'vu rmejr, wjg vmwn qeii nm"