Marketing question : What is the average Quantity per ProductID? List both Average of Quantity and ProductlD. Fill in the right entries in the SQL statement to answer this marketing question. (TIP: You could use GROUP BY) SELECT FROM OrderDetails

Answers

Answer 1

The SQL statement: SELECT ProductID, AVG(Quantity) AS AverageQuantity

FROM OrderDetails

GROUP BY ProductID;

In this SQL statement, the "SELECT" keyword is used to specify the columns to be returned in the result. We want to retrieve both the ProductID and the average Quantity per ProductID, so we include both columns in the SELECT statement.

The "AVG(Quantity) AS AverageQuantity" part calculates the average quantity for each ProductID and assigns it the alias "AverageQuantity" for better readability in the result.

The "FROM OrderDetails" specifies the table from which the data will be retrieved. You should replace "OrderDetails" with the actual name of the table that contains the order details.

Lastly, the "GROUP BY ProductID" clause is used to group the data by ProductID. This allows the calculation of the average quantity for each unique product ID.

By executing this SQL statement, you will obtain a list of ProductIDs along with their corresponding average quantities. This information can be useful in analyzing product performance and identifying trends in customer demand.

To learn more about SQL visit:

brainly.com/question/29987414

#SPJ11


Related Questions

Unlike wlan technology, bluetooth requires ____ access point(s) for communication.

Answers

Bluetooth requires no access points to communicate, in contrast to WLAN technology.

What is WLAN technology?A collection of colocated computers or other devices that form a network based on radio broadcasts rather than wired connections is known as a wireless local-area network (WLAN). Anyone reading this page while connected to Wi-Fi is utilizing a WLAN, which is a form of network.A wireless local area network, or WLAN, allows a mobile user to connect to a local area network (LAN). The wireless LAN technologies are outlined by the IEEE 802.11 group of standards. The 802.11 standard employs CSMA/CA and the Ethernet protocol for path sharing (carrier sense multiple access with collision avoidance).

To learn more about WLAN technology, refer to:

https://brainly.com/question/1440523

#SPJ4

I toss a fair six-sided die twice, and obtain two numbers X and Y. Let A be the event that

X = 2, B be the event that X +Y = 7, and C be the event that Y = 3. Show mathematically

answers to the following.

(a) Are A and B independent?

(b) Are A and C independent?

(c) Are B and C independent?

(d) Are A,B, and C independent?

Answers

In the situation raised, variables A and C are independent variables and B is a dependent variable.

What is an independent variable?

An independent variable is a value of a mathematical operation that does not depend on the variation of other variables to change. The independent variables, on the other hand, influence the behavior of the dependent variables.

What is a dependent variable?

A dependent variable is a type of variables whose value depends on the independent variables.

According to the above, it can be inferred that the value of B is a dependent variable because it depends on the values of A and C, on the other hand, A and C are independent values because no event supposes a change in the value of A and C.

Learn more about variable in: https://brainly.com/question/787279

True or false. The PIC is an inter grated circuit in which the microprocessor architecture, along with read only memory (ROM) and random access memory (RAM), are all placed into one integrated circuit that may be reprogrammed; the microprocessor cannot.

Answers

Answer:

your partner in crime can not ROM around without a RAM.

Explanation:

so it would be false.

What is the difference between user program and packages program?

Answers

Answer//

program is to enter a program or other instructions into (a computer or other electronic device) to instruct it to do a particular task while package is to pack or bundle something.

// have a great day //

Explanation//

A program is exactly that: a set of instructions that tells a computer how to do something.

The term package has multiple meanings, but with regard to programs, it generally means “the set of program files, data files, and other things that make up a particular application”.

// may I have Brainliest? //

how do you know a resource is credible

Answers

In the Business world people are often measured by their???
A- soft skills
B- hobbies
C- iq
D- technical skills

Answers

Answer:

D

Explanation:

You need skills to succeed!!

Answer is D !!!!!!!!

Give an algorithm for the following problem. Given a list of n distinct
positive integers, partition the list into two sublists, each of size n/2,
such that the difference between the sums of the integers in the two
sublists is minimized. Determine the time complexity of your algorithm.
You may assume that n is a multiple of 2.

Answers

Answer:

The overall time complexity of the algorithm is O(n log n), dominated by the initial sorting step.

Explanation:

To solve the problem of partitioning a list of distinct positive integers into two sublists of equal size such that the difference between the sums of the integers in the two sublists is minimized, you can use a recursive algorithm known as the "Subset Sum" algorithm. Here's the algorithm:

1. Sort the list of positive integers in non-decreasing order.

2. Define a function, let's call it "PartitionSubsetSum," that takes the sorted list of positive integers, starting and ending indices of the sublist to consider, and the current sum of the first sublist.

3. If the starting index is greater than the ending index, return the absolute difference between the current sum and twice the sum of the remaining sublist.

4. Calculate the midpoint index as the average of the starting and ending indices: `mid = (start + end) // 2`.

5. Recursively call the "PartitionSubsetSum" function for both sublists:

  - For the first sublist, use the indices from "start" to "mid".

  - For the second sublist, use the indices from "mid+1" to "end".

  Assign the return values of the recursive calls to variables, let's call them "diff1" and "diff2," respectively.

6. Calculate the sum of the first sublist by summing the elements from the starting index to the midpoint index: `sum1 = sum(nums[start:mid+1])`.

7. Recursively call the "PartitionSubsetSum" function for the second sublist, but this time with the current sum plus the sum of the first sublist: `diff2 = PartitionSubsetSum(nums, mid+1, end, curr_sum+sum1)`.

8. Return the minimum difference between "diff1" and "diff2".

Here's the Python implementation of the algorithm:

```python

def PartitionSubsetSum(nums, start, end, curr_sum):

   if start > end:

       return abs(curr_sum - 2 * sum(nums[start:]))

   mid = (start + end) // 2

   diff1 = PartitionSubsetSum(nums, start, mid, curr_sum)

   diff2 = PartitionSubsetSum(nums, mid+1, end, curr_sum + sum(nums[start:mid+1]))

   return min(diff1, diff2)

def PartitionList(nums):

   nums.sort()

   return PartitionSubsetSum(nums, 0, len(nums)-1, 0)

# Example usage:

nums = [4, 1, 6, 3, 2, 5]

min_diff = PartitionList(nums)

print("Minimum difference:", min_diff)

```

The time complexity of this algorithm can be analyzed as follows:

- Sorting the list of n positive integers takes O(n log n) time.

- The "Partition Subset Sum" function is called recursively for each sublist, and the number of recursive calls is proportional to the number of elements in the list (n). Since the list is divided in half at each recursive call, the depth of recursion is log n.

- Each recursive call processes a constant amount of work, including calculations and slicing operations, which can be done in O(1) time.

Therefore, the overall time complexity of the algorithm is O(n log n), dominated by the initial sorting step.

Learn more about algorithm:https://brainly.com/question/13902805

#SPJ11

Which features are important when you plan a program? Select 4 options. Responses Knowing what you want the program to do. Knowing what you want the program to do. Knowing what the user needs the program to accomplish. Knowing what the user needs the program to accomplish. Knowing what information is needed to find the result. Knowing what information is needed to find the result. Knowing how many lines of code you are allowed to use. Knowing how many lines of code you are allowed to use. Knowing how to find the result needed.

Answers

The important features when planning a program are the following four.

Knowing what you want the program to do.Knowing what the user needs the program to accomplish.Knowing what information is needed to find the result.Knowing how to find the result needed.

Which features are important when you plan a program?

The important features when planning a program are the following four:

Knowing what you want the program to do, knowing what the user needs the program to accomplish, knowing what information is needed to find the result, and how to find the result needed.

These four features are important because they help ensure that the program is designed to meet the user's needs and that the necessary information is available to produce the desired result. The number of lines of code allowed may also be a consideration, but it is not as critical as these other factors.

Learn moer about programs at:

https://brainly.com/question/23275071

#SPJ1

ou can rent time on computers at the local copy center for $ setup charge and an additional $ for every minutes. how much time can be rented for $?

Answers

To determine how much time can be rented for a given amount of money, we need the specific values of the setup charge and the cost per minute. Once we have those values, we can calculate the maximum rental time within the given budget.

Let's assume the setup charge is $X and the cost per minute is $Y.

To calculate the maximum rental time, we can use the formula:

Maximum rental time = (Total budget - Setup charge) / Cost per minute

Let's substitute the given values into the formula:

Maximum rental time = ($ - $X) / $Y

For example, if the setup charge is $10 and the cost per minute is $0.50, and we have a budget of $100, the calculation would be:

Maximum rental time = ($100 - $10) / $0.50

Maximum rental time = $90 / $0.50

Maximum rental time = 180 minutes

Therefore, with a budget of $100, a setup charge of $10, and a cost per minute of $0.50, the maximum rental time would be 180 minutes.

To know more about setup click the link below:

brainly.com/question/16895344

#SPJ11

What happens on a phone or tablet if it runs out of RAM to run processes? Is there additional storage?

Answers

Answer:

Ur phone/tablet starts to become laggy

Explanation:

True/False: To input a string from a user, we must know beforehand exactly how many characters are in that string.

Answers

False. To input a string from a user, we do not need to know beforehand exactly how many characters are in that string.

When we ask the user for input, we can simply provide them with a prompt, such as "Enter a string:". The user can then input any string of their choice, regardless of its length. We do not need to specify the exact number of characters in advance.

In most programming languages, we can use functions or methods to read user input as a string. For example, in Python, we can use the `input()` function to prompt the user for input and store it as a string. Here's an example:

```
user_input = input("Enter a string: ")
```

In this example, the user can input any string they want, whether it has 5 characters or 500 characters. The `input()` function simply reads the input as a string and assigns it to the variable `user_input`.

So, we don't need to know the exact length of the string in advance when receiving user input. We can handle strings of any length using appropriate functions or methods provided by the programming language we are using.

To know more about programming languages, visit:

https://brainly.com/question/23959041

#SPJ11

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

1. You are troubleshooting a computing session in which a user can't access another computer named BillsComputer on the network. You open a command prompt and type ping BillsComputer but you get an error. Next, you look in your network documentation to get the address of BillsComputer and try the ping command using the IP address and the command works. Which part of the communication process was not working when you tried the ping BillsComputer command. a. network medium

b. name lookup

c. network interface

d. device driver

2. You want to test an application upgrade on a server that is running as a guest OS in Hyper-V. You want an exact duplicate of the server so you can test the upgrade without affecting the production server. What should you do?

a. dynamically provision

b. revert a snapshot

c. live migrate

d. export the VM

3: You have just installed a new disk drive in a Windows server and you have booted the system. You open Disk Manager, change the disk type to dynamic and create three volumes. Are you ready to store files on the disk?

a. Yes, you can start using dynamic disks after you have created a volume.

b. Yes, Disk Manager installs FAT32 on new volumes by default.

c. No, you must first prepare the disk with a file system by formatting it.

d. No, you need to partition the disk after creating the volumes.

Answers

The part of the communication process that was not working when you tried the "ping BillsComputer" command was the name lookup.

When you type "ping BillsComputer," the computer first needs to translate the computer name "BillsComputer" into an IP address. This process is known as name lookup. If the name lookup fails, you will receive an error message indicating that the computer name could not be resolved.

In this case, when you tried to ping BillsComputer, you received an error, which suggests that the computer name could not be resolved. However, when you used the IP address instead, the command worked. This indicates that the issue was with the name lookup process, not the network medium, network interface, or device driver.

2. To test an application upgrade on a server running as a guest OS in Hyper-V without affecting the production server, you should revert a snapshot.

Snapshots in Hyper-V allow you to capture the state of a virtual machine at a specific point in time. By reverting a snapshot, you can restore the virtual machine to the exact state it was in when the snapshot was taken. This means that any changes made during the testing of the upgrade will not affect the production server.

Dynamically provisioning refers to allocating resources as needed, live migration involves moving a running virtual machine from one host to another, and exporting the VM creates a copy of the virtual machine that can be imported and used on another Hyper-V host.

3. No, you are not ready to store files on the disk after changing the disk type to dynamic and creating three volumes in Disk Manager.

When you change the disk type to dynamic and create volumes in Disk Manager, you are preparing the disk for storage. However, you still need to format the volumes with a file system before you can store files on them.

Formatting a disk involves creating a file system, such as NTFS or FAT32, on the disk. This process initializes the disk and allows the operating system to organize and store data on the disk.

Therefore, the correct answer is option c: No, you must first prepare the disk with a file system by formatting it. Storing files on the disk can only be done after formatting the volumes. Option a is incorrect because creating volumes alone does not allow you to start using dynamic disks. Option b is incorrect because Disk Manager does not install FAT32 on new volumes by default. Option d is incorrect because partitioning the disk is not necessary after creating the volumes.

To know more about IP address visit:

https://brainly.com/question/33723718

#SPJ11

2.3 Code Practice: Question 1

Answers

Answer:

a=int(input("Enter a numerator: "))

b=int(input("Enter a divisor: "))

quotient=a/b

remainder=a%b

print("Quotient is: " + str(int(quotient)))

print("Remainder is: " + str(int(remainder)))

Explanation:

Hope this helps lovely :)

Answer:

Answer is in explanation

Explanation:

num = int(input("Enter Numerator "))

den = int(input("Enter Denominator "))

one=int(num/den)

two=int(num%den)

print(one + two)

suppose you have a personal computer that has reached the end of life and you plan to purchase a replacement. once you have purchased the new computer and transferred your files, there is no need to keep the old computer. what is the best method of disposal for the computer.

Answers

The best method of disposal for the computer will be Donation method.

Explaning the BEST Disposal methods

There are several ways of disposing used items but I have handpicked the ones mostly applicable to computers. They are listed below:

Recycling: Recycling is a popular and environmentally responsible method of disposing of old computer equipment. Many cities have e-waste recycling programs that allow residents to drop off their old computers for safe disposal. Recycling ensures that the components of the computer are reused or disposed of in a way that does not harm the environment.Donation: Another option is to donate old computer equipment to schools, non-profits, or other organizations that could use it. Many schools or non-profits may be willing to accept old computers that are still in good working condition.

Learn more about recycling here:

https://brainly.com/question/2055088

#SPJ4

what is a computer in daily life​

Answers

Answer:

The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.

Explanation:

name two components required for wireless networking
(answer fastly)​

Answers

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

Moriah has written the following line of code to calculate the area of a circle, but her answer isn’t as accurate as the one she gets on her calculator. What could she do to improve the code’s accuracy?

radius = int(input("What is the radius? "))

area = 3.14 * radius**2

print("The area is", area)

A.
She should type in a longer decimal approximation for pi.

B.
She should use math.pi instead of 3.14.

C.
She should combine the formula and the print statement to make the program more efficient.

D.
She should use a different formula.

Answers

Follows are the code to this question:

import math as x #import math package

#option a

radius = 10#defining radius variable  

print("radius = ", radius)#print radius value

realA = x.pi * radius * radius#calculate the area in realA variable

print("\nrealA = ", realA)#print realA value

#option b

a1 = 3.1  * radius * radius#calculate first area in a1 variable  

print("Area 1= ", a1)#print Area

print("Percentage difference= ", ((realA - a1)/realA) * 100) #print difference  

a2 = 3.14  * radius * radius#calculate first area in a2 variable                            

print("Area 2= ", a2)#print Area

print("Percentage difference= ", ((realA - a2)/realA) * 100)#print difference  

a3 = 3.141  * radius * radius#calculate first area in a2 variable                       print("Area 3= ", a3)#print Area

print("Percentage difference= ", ((realA - a3)/realA) * 100) #print difference  

Output:

please find the attached file.

In the given Python code, firstly we import the math package after importing the package a "radius" variable is defined, that holds a value 10, in the next step, a "realA" variable is defined that calculate the area value.

In the next step, the "a1, a2, and a3" variable is used, which holds three values, that is "3.1, 3.14, and 3.141", and use the print method to print its percentage difference value.  

Learn more about python on:

https://brainly.com/question/30427047

#SPJ1

a multicast subscription is made between two dante devices. the latency value of the transmitter and receiver are 0.25msec and 0.5msec, respectively. what is the resulting latency of this stream?

Answers

A Dante device's average default delay is 1 ms. This is enough for a very big network that consists of 100 megabit lines to Dante devices and a gigabit network core (with up to 10 hops between edge switches).

The term "latency" refers to the minute amount of time (10 milliseconds in the case of Dante Via) that is added to each audio stream. Via may 'packetize' the audio from the source and send it across the network to the destination before it is scheduled to be played out thanks to the minor delay. Audio and control are combined into one potent network because computer control and recording signals go over the same connections as the audio data.

Learn more about network here-

https://brainly.com/question/13102717

#SPJ4

what are two reasons for using filter buttons rather than slicers to filter data?

Answers

You should use filter buttons rather than slicers to filter data for two reasons: when you need to apply criterion filters with text, date, or numeric variables.

What do filter buttons do?You can filter the record set using the Filter button, which can be accessed through the Choose Records dialogue or the print-time Record Picker data entry control, which is included in each column header of the table.Filter dropdown lists can be opened by clicking the filter buttons that are visible in the column headers. The conditions for data filtering can be specified by end users using such lists. The major factors influencing element appearance are shown in the table below. By choosing one or more report values and using the Filter drop-down button, you may quickly filter the data in a report.

To learn more about filter buttons, refer to:

https://brainly.com/question/14376643

Two reasons for using filter buttons rather than slicers to filter data are:

1. Space-saving: Filter buttons are located in the header row of a table or dataset, which means they do not take up additional space on the worksheet like slicers do. This makes it easier to manage the layout of your data and other content on the sheet.

2. Design Consistency: Filter buttons can be used to maintain consistency in design and layout across different parts of a dashboard or report. When slicers are used, they can sometimes result in varying sizes, styles, and formatting, which can affect the overall aesthetics and visual appeal of the dashboard or report. Filter buttons, on the other hand, can be customized to have consistent styles, sizes, and formatting, providing a cohesive and professional look.

In summary, using filter buttons can save space on your worksheet and provide design consistency compared to using slicers.

Learn more about Slicers here:

https://brainly.com/question/18444636

#SPJ11

Analyse and apply the elements that contribute towards a company’s online

Answers

A company's online presence is crucial to its success in today's digital age. Here are some elements that contribute towards a company's online presence:

1. Website Design: A company's website should be visually appealing, easy to navigate, and provide relevant information about the company and its products or services.

2. Social Media Presence: A strong social media presence can help a company connect with its audience and build brand awareness. It is important to choose the right platforms and create engaging content that resonates with the target audience.

3. Search Engine Optimization (SEO): SEO is the process of optimizing a website to rank higher in search engine results pages. This can be achieved through keyword research, on-page optimization, and link building.

4. Content Marketing: Content marketing involves creating and sharing valuable content that attracts and engages the target audience. This can include blog posts, infographics, videos, and social media posts.

5. Online Advertising: Paid advertising can help a company reach a wider audience and drive traffic to its website. This can include search engine marketing (SEM), display advertising, and social media advertising.

By utilizing these elements, a company can create a strong and effective online presence that helps it reach its target audience and achieve its business goals.

the decision structure that has two possible paths of execution is known as

Answers

The decision structure that has two possible paths of execution is known as double alternative.

What is decision?

In psychology, making a decision—also known as making a decision in writing—is viewed as the cognitive process that results in the selection of a belief or a course of action from among a variety of possible alternative possibilities. It could be illogical and unreasonable at the same time. A decision-decision-values, maker's preferences, and beliefs all play a role in the deliberative process of making the decision.

Every process of decision-making ends with a decision, which may or may not result in action. Decision-making research is also published under the heading of problem solving, particularly in European psychology research. Making decisions can be seen as a process for solving problems that leads to a conclusion that is deemed ideal, or at the very least, acceptable.

To know more about decision visit:

brainly.com/question/30502726

#SPJ4

50. List any three sources of graphics that can be used in Microsoft word.​

Answers

Answer:

1. Shapes: Microsoft Word includes a variety of pre-designed shapes that can be easily inserted into a document, such as circles, squares, arrows, and stars.

2. Clipart: Microsoft Word includes a large collection of clipart images that can be inserted into a document to add visual interest. These images can be searched for and inserted using the "Insert" menu.

3. Images: Microsoft Word also allows you to insert your own images, such as photographs or illustrations, into a document. These images can be inserted by using the "Insert" menu and selecting "Picture" from the options.

One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all that apply. If it is easy to understand, no one will dispute what is included in the algorithm. It will give everyone else an opportunity to comment on the process described in the algorithm. It will serve as the starting point for all future activity. It communicates the consecutive instructions of the solution.

Answers

Answer: B,C,D

Explanation:

Answer:

the answer is B,C,D

Explanation:

Choose the best answer by writing the item number (1, 2, 3, or 4) in the blank box. What is the fundamental security hypothesis of a digital certification hierarchy?
The data formats must be specified in Abstract Syntax Notation One (ASN.1).
All certificates that were revoked but have not yet expired are entirely contained in the CRL.
Certification path constraints must never refer to cross certification.
The root CA certificate is obtained through an extra-cryptographically secure, trusted channel by all interested parties.

Answers

The fundamental security hypothesis of a digital certification hierarchy is that the root CA certificate is obtained through an extra-cryptographically secure, trusted channel by all interested parties. (Answer: 4)

The root CA (Certificate Authority) certificate plays a critical role in a digital certification hierarchy. It is the highest level of authority and serves as the trust anchor for the entire certification chain. The fundamental security hypothesis is based on the assumption that the root CA certificate is securely distributed to all parties involved in the system.

The root CA certificate needs to be obtained through an extra-cryptographically secure and trusted channel. This means that the process of distributing the root CA certificate should not rely solely on cryptographic methods that can be compromised. Instead, it requires a separate, trusted mechanism to ensure the authenticity and integrity of the root CA certificate.

By obtaining the root CA certificate through an extra-cryptographically secure and trusted channel, the digital certification hierarchy establishes a foundation of trust. This ensures that all subsequent certificates issued by intermediate CAs (Certificate Authorities) and end-entity certificates can be validated and trusted. The secure distribution of the root CA certificate helps prevent malicious actors from tampering with the certification chain and protects against attacks such as certificate spoofing or man-in-the-middle attacks.

In conclusion, the fundamental security hypothesis of a digital certification hierarchy is that the root CA certificate is obtained through an extra-cryptographically secure, trusted channel. This hypothesis emphasizes the importance of establishing a trusted foundation for the entire certification chain, ensuring the integrity and authenticity of the certificates issued within the system.

Learn more about man-in-the-middle attacks here:

https://brainly.com/question/28446676

#SPJ11

Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn't consider this a problem because his computer was working properly. However, now Larry has decided that he should investigate why the time is not accurate. What can you tell Larry to check to find out why the clock does not keep the right time?

Answers

Answer + Explanation:

You can tell Larry to set his device's location on 'enabled' at all times. That way, you get the time zone too. For example. if you live in the US, and your Location is not enabled, then the device may think that you are in China, or where the device was last at.

Hi I will Venmo or cash app 50$ to whoever can get all my school work in a week 8th grade btw.

Answers

Answer:

i gotchu dawg

Explanation:

Answer:

UwU Can't, thanks for le points sowwy

Explanation:

Digital content management is one application of technology
O private cloud
O blockchain
O nano O AI

Answers

The correct answer to the given question about Digital Content Management is option B) Blockchain.

Businesses can streamline the creation, allocation, and distribution of digital material by using a set of procedures called "digital content management" (DCM). Consider DCM to be your digital capital's super-librarian, managing and safeguarding it. These days, there are two general categories of digital content management systems: asset management (DAM) systems, and content management systems (CMS). To create effective corporate operations, internal digital content needs to be categorized and indexed. Security is also necessary. For structuring digital materials for public distribution, whether now or in the future, CMSs are particularly effective. The majority of CMS content consists of digital items for marketing, sales, and customer service. The public-facing digital content that is often found in a CMS.

To learn more about digital content management click here

brainly.com/question/14697909

#SPJ4

Hey i need some help with code.org practice. I was doing a code for finding the mean median and range. the code is supposed to be including a conditional , parameter and loop. I'm suppose to make a library out of it and then use the library to test the code? please help!
here is the link to the code.
https://studio.code.org/projects/applab/YGZyNfVPTnCullQsVFijy6blqJPMBOgh5tQ5osNhq5c
P.S. you cant just type on the link i shared you have to click view code and then remix to edit it. thanks

Answers

Answer:

https://studio.code.org/projects/applab/YGZyNfVPTnCullQsVfijy6blqJPMBOgh5tQ5osNhq5c

Explanation:

―Connectivity is Productivity‖- Explain the statements.

Answers

connectivity is productivity. It’s true for a modern office, and also for any place – for an undeveloped village.
Other Questions
1. As the gang excitedly gets ready for the rumble, Ponyboy... *A. Pleads with Darry to allow him to join the gang in the fightB. Pleads with Darry to stay home and not have to fight with the gangC. Falls ill and is too weak to fightD. Is undecided: he's conflicted to fight or stay home using the rule of 70, a population growth rate of 2% annually will result in doubling a population in 35 years. Graph 3,2 after rotation 180 degrees counterclockwise around the orgin when Michelle studies for a test in her noisy apartment, she always has a red bull energy drink at hand. the encoding specificity principal would suggest that she should *** I really need help with this question the phrase todos saben que los gatos are nocturnal, means: everyone knows cats all cats everyone cats ______ are chemical messengers secreted by glands. Exocrine glands, such as sweat glands, secrete fluids through ducts. _______ glands secrete hormones directly into the bloodstream. The _______ gland plays an important role in puberty and growth. Epinephrine, triggering the "fight or flight" response, is produced by the _______ glands, which sit on top of the kidneys. Most glands that secrete hormones operate using feedback mechanisms. When hormone concentrations are high, the gland will produce ________ of the hormone. Many cells produce chemicals called _______, hormone-like substances that impact inflammation and reproduction. The gland that helps regulate growth, body temperature, and the level of calcium in the blood is called the _______. Describe the function and compare steroidal and nonsteroidal hormones. How does each type of hormone interact with the cell? What other molecules are required for or involved in their function? A 2000 L tank initially contains 400 liters of pure water. Beginning at t=0, an aqueous solution containing 10 gram per liter of potassium chloride flows into the tank at a rate of 8 L/sec, and an outlet stream simultaneously starts flowing at a rate of 4 L per second. The contents of the tank are perfectly mixed, and the density of the feed stream and of the tank solution, may be considered constant. Let V(t)(L) denote the volume of the tank contents and C(t) (g/L) the concentration of potassium chloride in the tank contents and outlet stream. Write a total mass balance on the tank contents convert it to an equation dv/dt, provide an initial condition. Solve the mass balance equation to obtain an expression for V(t). An auditor's affinity for and identification with the audit profession is referred to asA. Commitment to the firmB. Professional identityC. Commitment to the organizationD. Commitment to colleagues C 50 D 30HELP PLEASE WILL MARK U BRAINLIST! Which is an example of disturbance and primary succession currently happening on earth?. Is there any relation between GDP growth rate unemployment and inflation? 3x + 2y = 85x + 2y = 12 1. describe the negative feedback loop that controls the rate of erythropoiesis. under what circumstances would you expect the rate of erythropoiesis to be increased? Does this relation represent a function? HELP why do you think chopins heart was buried separate from his body near the place of his birth ? Select the adjective form that best completes each sentence.Hillary is 5'4". Jane is 5'6". Jane is than Hillary.Astou is very nice to everyone she meets. She is person I know.Pablo is better at telling jokes than Abdoul. Pablo is than Abdoul.Bread costs $1.50. Milk costs $2.00. Crackers cost $3.50. Crackers are . SAT Math scores are normally distributed with a mean of 500 and standard deviation of 100. A student group randomly chooses 33 of its members and finds a mean of 518. The lower value for a 95 percent confidence interval for the mean SAT Math for the group is What type of training method delivers content via the internet and is cost-effective for an organization? Simulation Method Cosching Coop training Elearning Question 7 1 pts Which is not a pitfall of ineffective training? Inefficient employee screening process Conducting the traininginsub-standardfaclities Lackof a disciplined proces for eval atingtaining proy ans be ought in from the outside Having a clear objectlve for the trainling and its outcone