what sql function will return all records from the left table and only the matching records from the right?

Answers

Answer 1

The SQL function that returns all records from the left table and only the matching records from the right is LEFT JOIN.What is a LEFT JOIN?A left join is a method of combining two tables in a relational database in which all the data from the left table is retrieved and only the matched data from the right table is displayed.

In other words, a left join returns all rows from the left table and only the matching rows from the right table (or null values if there are no matches).The syntax for LEFT JOIN is as follows:SELECT table1.column1, table2.column2, ...FROM table1LEFT JOIN table2ON table1.matching_column = table2.matching_column;Here, table1 is the left table, and table2 is the right table.

The ON clause specifies the matching column that will be used to join the tables.For example, consider the following two tables, CUSTOMERS and ORDERS:CUSTOMERS table:ORDERS table:To join these two tables based on the matching CustomerID column,

we would use the following SQL statement:SELECT Customers.CustomerName, Orders.OrderIDFROM CustomersLEFT JOIN OrdersON Customers.CustomerID = Orders.CustomerID;This would return all records from the left table (Customers) and only the matching records from the right table (Orders). If there is no matching record in the right table, the result will contain null values.

To know more about function visit:

https://brainly.com/question/30721594

#SPJ11


Related Questions

raid solution that offers redundancy over performance

Answers

If you need solid performance but also need a level of redundancy, RAID 10 is the best way to go.

Which RAID is the most performant?

A RAID 1 array is made up of two disk drives, one of which is a mirror of the other (the same data is stored on each disk drive).

RAID 10 is the ideal option if you want both high performance and redundancy. Remember that you will lose half of your available storage space, so plan appropriately! If redundancy is most essential to you, you’ll be OK with either a RAID 10 or a RAID 60.

RAID-10 provides the highest speed and redundancy features, but it reduces useable capacity by half, making it costly to implement at scale.

To learn more about RAID-10 to refer:

https://brainly.com/question/14669307

#SPJ4

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which is initially in the top left square facing downwards.
Create a solution that would enable the robot to be in the position found below. Make sure to use CAN_MOVE () to receive credit.

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which

Answers

Using knowledge in computational language in python it is possible to write a code that Create a solution that would enable the robot to be in the position found below.

Writting the code:

import random

lis=[]

for i in range(0,10):

 num=random.randint(1,12)

 lis.append(num)

tot=sum(lis)

avg=tot/10

print(avg)

See more about python at brainly.com/question/18502436

#SPJ1

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which

A time-saving strategy that helps define unfamiliar words involves using
familiar words for clues.
the dictionary for clues.
online resources.
reference books.

Answers

The correct answer is A. Familiar words for clues

Explanation:

Finding unfamiliar words is common while reading, especially in texts that belong to a specific field such as medicine, technology, etc. This can be handled through multiple strategies such as using a dictionary, guessing the meaning of the word based on its parts, and using context clues.

In this context, one of the easiest and most time-saving strategy is the use of context clues that implies using the familiar words as clues to guess the meaning of an unfamiliar word. This is effective because in most cases the meaning of an unknown word can be determined using the context of the word or words around the unknown word. Also, this strategy takes little time because you only need to analyze the sentence or paragraph where the unknown word is. Thus, the time-saving strategy to define unfamiliar words involves using familiar words for clues.

Answer:

A is correcto mundo

Explanation:

diffreciate between primary source of information and secondary source of information​

Answers

Answer:

Primary is firsthand, secondary is viewed through articles and other materials.

Explanation:

EX: Primary account of a story, secondary view through pictures.

Badminton Subject*
what are the types of conmon injuries in Badminton (show
diagram and explains)

Answers

Common injuries in badminton include

sprains, strains, tendinitis.

What is a Sprain?

Sprains occur when ligaments are stretched or torn, often in the ankle or wrist. Strains result from overstretching or tearing muscles, typically in the shoulder or thigh.

Tendinitis refers to inflammation of the tendons, most commonly affecting the elbow (tennis elbow) or shoulder (rotator cuff tendinitis). These injuries can be caused by repetitive motions, sudden movements, or inadequate warm-up.

Preventive measures like proper warm-up, stretching, and using appropriate footwear are crucial. Protective equipment such as braces or straps can help support vulnerable joints. If injured, rest, ice, compression, and elevation (RICE) are recommended, along with seeking medical advice if needed.

Sprains: Ligament stretching/tearing in ankle or wrist.

Strains: Muscle stretching/tearing, often in shoulder or thigh.

Tendinitis: Tendon inflammation in elbow or shoulder.

Preventive measures: Warm-up, stretching, proper footwear.

Protective equipment: Braces, straps for joint support.

Treatment: RICE (Rest, Ice, Compression, Elevation), seek medical advice if necessary.

Read more about sports injury here:

https://brainly.com/question/19025499

#SPJ1

Badminton Subject*what are the types of conmon injuries in Badminton (showdiagram and explains)

Which of the following is NOT an example of an endpoint?
Select one:
a. Mainframe
b. Desktop
c. Smartphone
d. Point of Sale Terminal - POS
The following MITRE Tactics are designed to perform each of these associated goals. Reconnaissance - Maintain the attacker foothold, Execution - Gain higher-level permissions, Lateral Movement - Move through the compromised environment. Select True or False.
Select one:
a. True
b. False

Answers

The option that is note an example of an endpoint is option b. Desktop

2. Option A: True statement.

What is communicating endpoint?

A particular class of communication network node is a communication endpoint. It is an interface that a communicative party or communication channel has made available.

A publish-subscribe topic or a group in group communication systems are examples of the latter type of communication endpoint.

The MITRE Tactics are designed to perform each of these associated goals are:

Reconnaissance - Maintain the attacker foothold, Execution - Gain higher-level permissions, Lateral Movement - Move through the compromised environment.

Therefore, The option that is note an example of an endpoint is option b. Desktop

2. Option A: True statement.

Learn more about endpoint from

https://brainly.com/question/2681581
#SPJ1

Ungroup the worksheets and ensure the Employee_Info worksheet is active. Click cell G6 and enter a nested logical function that calculates employee 401K eligibility. If the employee is full time (FT) and was hired before the 401k cutoff date 1/1/19, then he or she is eligible and Y should be displayed, non-eligible employees should be indicated with a N. Be sure to utilize the date located in cell H3 as a reference in the formula. Use the fill handle to copy the function down completing the range G6:G25

Answers

In cell G6 of the Employee_Info worksheet, enter the following nested logical function: =IF(AND(B6="FT",C6<H3),"Y","N"). Then use the fill handle to copy the function down to complete the range G6:G25.

To calculate the employee's 401K eligibility based on the provided conditions, we use a nested logical function in cell G6. The IF function is used to check two conditions using the AND function:

1. The employee's employment type (B6) should be "FT" (full time).

2. The employee's hire date (C6) should be earlier than the cutoff date (H3).

If both conditions are true, the function will return "Y" to indicate eligibility. Otherwise, it will return "N" to indicate non-eligibility.

By using the fill handle to copy the formula down to the range G6:G25, the same logic will be applied to each corresponding row, automatically updating the values based on the employee's employment type and hire date.

Learn more about Employee_Info worksheet here:

https://brainly.com/question/31917702

#SPJ11

Which one of these 3 Apple products is the best one?

Which one of these 3 Apple products is the best one?

Answers

Answer:

First one

Explanation:

Because it is expensive

mary is creating a website to document her adoption of a 1-year old little girl from kazakhstan. her friend shauna makes the following recommendations and suggests that mary follow them.

Answers

Shauna tells Mary that she should consider using a code editor to enter her code.

What is a code editor?

Code editors are known to be tools that are said to be used by a lot of  programmers as well as web developers to write and also to be able to edit code.

Note that they are people who are known to be used for making  software, applications and also other forms of web development purposes.

Before the introduction of code editors, developers as well as programmers are known to make use of text editors such as Notepad on Windows and ithers.

Therefore, Shauna tells Mary that she should consider using a code editor to enter her code.

Learn more about code from

https://brainly.com/question/6418860
#SPJ1

.

Mary is creating a website to document her adoption of a 1-year old little girl from Kazakhstan. Her friend Shauna makes the following recommendations and suggests that Mary follow them.

Shauna tells Mary that she should consider using ____ to enter her code.

answer choices

a code editor

hand coding

her favorite browser

wireframe

What are the importance of computer in electronics engineering

Answers

Computers play an important role in electronics engineering as they are used to design and test electronic components and systems. They are also used to control manufacturing processes and to automate test and measurement equipment.

What is electronics engineering?

Electronics engineering is a branch of electrical engineering that arose in the early twentieth century and is characterised by the use of active components like as semiconductor devices to amplify as well as control electric current flow. Previously, only passive devices also including mechanical switches, resistors, inductors, and capacitors were employed in electrical engineering. Analog electronics, digital electronics, consumer electronics, embedded systems, and power electronics are all covered.

To learn more about electronics engineering

https://brainly.com/question/28194817

#SPJ13

You defined a shoe data type and created an instance.
class shoe:
size = 0
color = 'blue'
type = 'sandal'
myShoe = shoe()
Which statement assigns a value to the type?
type = 'sneaker'
myShoe.type( 'sneaker')
myShoe.type = 'sneaker'
NEXT QUESTION
ASK FOR HELP

Answers

Answer:

myShoe.type = 'sneaker'

Explanation:

type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.

To assign a value to type filed of the object myShoe, reference the object then the field as such;

   myShoe.type = "sneaker"

You defined a shoe data type and created an instance. The statement that assigns a value to the type is myShoe.type = 'sneaker'. The correct option is C.

What is data in programming?

A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming.

An attribute of a piece of data called a "data type" instructs a computer system on how to interpret that data's value.

type is one of the class shoe's fields. The field type is also present in the myShoe object, which is an instance of the class shoe.

Reference the object and the field as such in order to assign a value to the type field of the object myShoe;

Therefore, the correct option is C. sneaker" in myShoe.type.

To learn more about data in programming, refer to the link:

https://brainly.com/question/14581918

#SPJ2

what is an example of an absolute cell reference​

Answers

Answer:

Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.

Explanation:

a networking technician is working on the wireless network at a medical clinic. the technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. which of the four network characteristics has been violated in this situation?

Answers

The creation and installation of efficient computer networks and systems is the responsibility of network technicians. They set up electronic wiring and internet connections.

Installing network components and operating systems like Windows, Unix, or macOS requires technical expertise. They must be knowledgeable in networking standards like TCP/IP, DNS, FTP, and SMTP, among others. Defending the computer network from cyber-attacks, which include setting up antivirus software and making sure it is updated often. educating staff members on the many aspects of the network and informing management of potential issues' causes and fixes In order for a society to function well, social capital is defined as "the networks of ties among individuals who live and work in that community."

To learn more about network technicians click the link below:

brainly.com/question/30364267

#SPJ4

why do computer graphics toolkits often include a lookat() function?

Answers

Computer graphics toolkits often include a lookat() function to simplify the process of creating realistic and engaging visuals.

This function helps define a view matrix, enabling the proper positioning of the camera in a 3D scene.

It takes three parameters: the camera's position, the target point it's focused on, and an up vector indicating the camera's orientation.

By calculating the appropriate view matrix, the lookat() function provides the necessary transformation for rendering objects from the camera's perspective.

This automatic calculation not only saves time for developers, but also ensures consistency and accuracy in visual representation across different applications and platforms.

Learn more about toolkits at

https://brainly.com/question/9978704

#SPJ11

explain why a holiday on a cruise liner will be an ideal holiday​

Answers

Answer:

The great thing about a cruise holiday is that everyone in your party can please themselves yet still have a real holiday together. The kids can make new friends and take part in fun and educational activities during the day, while the adults unwind by the pool, learn a new skill or hit the casino.

Can somoene explain the function of-

def __init__():

In python programming language​

Answers

Answer:

def is a keyword used to define a function, placed before a function name provided by the user to create a user-defined function

__init__ is one of the reserved methods in Python. In object oriented programming, it is known as a constructor. Python will call the __init__() method automatically when you create a new object of a class, you can use the __init__() method to initialize the object’s attributes.

Example code:

class Person:

 def __init__(self, name, age):

   self.name = name

   self.age = age

p1 = Person("John", 36)

print(p1.name)

print(p1.age)

Summary

Use the __init__() method to initialize the instance attributes of an object. The __init__() doesn’t create an object but is automatically called after the object is created.

If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be?
Question 10 options:
system32
Windows
Windows.old
Program Files (saved)

Answers

The files from the old installation will be stored in a folder named "Windows.old" located in the root directory of the hard drive. This folder contains all of the files from the previous installation.

What is the located ?

The located is a location or position. It can refer to a physical place, such as a house or a city, or it can refer to an abstract concept, such as a particular point in time. For example, someone might say, "The located of the meeting is in the conference room at 3 pm." This means that the meeting is taking place in the conference room at 3 pm. Additionally, if someone were to say, "The located of the treasure is on the island," this would mean that the treasure is located somewhere on the island.

To learn more about located

https://brainly.com/question/27359435

#SPJ1

Which of the following statements is true regarding the relationship of engineers and technology? O a. None of these statements is true O b. Engineers must adopt the technological pessimism view Oc. Engineers must adopt a critical attitude toward technology O d. Engineers must adopt the technological optimism view

Answers

Technology read-ahead, technology free-ahead Sequential access is the process of accessing a collection of items in a predetermined, ordered manner, such as data stored on magnetic tape, in a disk file, or in a memory array.

None of the aforementioned technologies can optimize sequential access. It is the opposite of random access, which makes it possible to access any part of a sequence at any time and from any location with the same ease and efficiency.

For instance, sequential access may be the only means of accessing the data when it is stored on a tape. It could likewise be the favored admittance procedure, for example, assuming everything necessary is the deliberate handling of a progression of information pieces.

To know more about sequential access:

brainly.com/question/12950694

#SPJ4

your new company is worried that they could be vulnerable to sql injection attacks for applications developed in-house. what would you recommend: packet filtering firewall patching input validation antivirus

Answers

To protect against SQL injection attacks for in-house developed applications, I would recommend implementing B: patching vulnerabilities and C: input validation in the applications.

Input validation: Ensure that all inputs are validated to prevent malicious code from being injected into the application. This can be done by using input validation techniques such as whitelisting, blacklisting, and regular expressions.Patching vulnerabilities: Ensure that all vulnerabilities in the applications are patched promptly. This can be done by applying patches and updates to the software used in the applications, as well as performing regular security audits to identify vulnerabilities and address them promptly.

Packet filtering firewalls and antivirus software can be useful for protecting against other types of attacks, but they may not be effective against SQL injection attacks. Therefore, they should be used as complementary measures along with input validation and patching vulnerabilities.

Overall, implementing input validation and patching vulnerabilities are the most effective ways to prevent SQL injection attacks in in-house developed applications. It is also important to provide ongoing security training to developers to ensure they understand the importance of secure coding practices and the risks associated with SQL injection attacks.

You can learn more about sql injection attacks at

https://brainly.com/question/30699453

#SPJ11

Pick the diagrams that are part of the UML set of diagrams.

Answers

The UML (Unified Modeling Language) set of diagrams includes several types of diagrams that are used for modeling different aspects of a software system.

Some of the most commonly used UML diagrams are:
1. Class diagram - This diagram shows the classes and their relationships in a software system. It is used to model the static structure of the system.
2. Use case diagram - This diagram shows the interactions between the system and its users. It is used to model the functional requirements of the system.
3. Sequence diagram - This diagram shows the interactions between the objects in the system over time. It is used to model the dynamic behavior of the system.
4. State diagram - This diagram shows the states that an object can be in and the transitions between them. It is used to model the behavior of an individual object.
5. Activity diagram - This diagram shows the activities that take place in the system and their relationships. It is used to model the workflow of the system.

The types of diagrams that are part of the UML set. Other types of diagrams include component diagrams, deployment diagrams, and communication diagrams, among others. Each type of diagram serves a specific purpose and is used to model a different aspect of the system. By using these diagrams, developers and stakeholders can gain a better understanding of the system and its behavior, and can communicate their ideas more effectively.

To know more about software system visit:

https://brainly.com/question/31228213

#SPJ11

Which loop prints the numbers 1, 3, 5, 7, …, 99?\


c = 1

while (c <= 99):
c = c + 2
print(c)

c = 1

while (c < 99):
c = c + 1
print(c)

c = 1

while (c <= 99):
print(c)
c = c + 2

c = 1

while (c < 99):
print(c)
c = c + 1

Answers

The loop that prints the numbers 1, 3, 5, 7, …, 99 is:

The Loop

c = 1

while (c <= 99):

   print(c)

   c = c + 2

This loop initializes the variable c to 1, then enters a while loop that continues as long as c is less than or equal to 99.

During each iteration of the loop, the value of c is printed using the print function, and then c is incremented by 2 using the c = c + 2 statement.

This means that the loop prints out every other odd number between 1 and 99, inclusive.

Read more about loops here:

https://brainly.com/question/19344465

#SPJ1

What is output if the user types in 8

Answers

Answer: 8

And if you hold shift while typing it, it gives *

Luis saves an attachment that he received from Kevin. Where will the attachment save by default?

on the desktop
in the documents directory
in the Outlook Archive
in the downloads directory

Answers

The folder (path) where the attachment would be saved by default is: B. in the documents directory.

What is a folder?

A folder is also referred to as a directory and it can be defined as a document that is typically used for storing and organizing an attachment or file on a computer system.

The type of folders.

In Computer technology, there are different type of folders and these include:

Downloads folderDocuments folderQuick file folderMain folderSearch folder

In this scenario, the attachment that Luis received from Kevin would be saved in the documents directory by default.

Read more on folder here: https://brainly.com/question/7697887

Answer:

in the documents directory

Explanation:

got it right on edge hope this helps

¿Podría decir que la Tecnología cumple como medio y herramienta para
satisfacer necesidades? Justifique su respuesta.

Answers

Answer:

gggaghqjgfdttedfvqtffqgfq graffiti qtrdgg

sí lo hace porque la tecnología es más importante que nunca ahora por la pandemia y por tener que hacer clases virtuales. La tecnología constituye literalmente nuestra sociedad actual. sin tecnología no tendríamos nada.

what special problems can occur with wireless networks

Answers

Distance from the router, as well as floors, walls, and large metal objects between a device and the router can interfere with wireless connectivity. Piggybacking, if you fail to secure your wireless network, anyone with a wireless-enabled computer in range of your access point can use your connection. Network congestion, Routers or other network equipment are overloaded with too much traffic. Speed Mismatch. This occurs when multiple users try to make use of the same server. I could go on and on.

Hope this helps!
Please give Brainliest!

Your supervisor has asked you to configure a new system using existing configurations. He said to use either an ARM template or a blueprint. What would you suggest and why? When do you think it is appropriate to use an ARM template and when is it not?

Answers

If precise control over infrastructure configuration is needed, use an ARM template. If enforcing standards and ensuring consistency is the priority, opt for Azure Blueprints.

When considering whether to use an ARM template or a blueprint for configuring a new system using existing configurations, the choice depends on the specific requirements and circumstances of the project.

Here are some considerations for each option:

ARM Templates:

1. ARM templates are Infrastructure as Code (IaC) templates used to define and deploy Azure infrastructure resources. They provide a declarative approach to provisioning resources.

2. Use ARM templates when you need precise control over the infrastructure configuration, including virtual machines, networking, storage, and other Azure services.

3. ARM templates are beneficial when you require version control, repeatability, and scalability for infrastructure deployments.

4. They allow for automation and rapid provisioning of resources, making it easier to manage and maintain infrastructure deployments.

Blueprints:

1. Azure Blueprints are used to create and manage a collection of Azure resources that can be repeatedly deployed as a package.

2. Use blueprints when you want to enforce compliance, governance, and organizational standards across multiple deployments.

3. Blueprints are suitable for scenarios where you need to ensure consistency and security compliance within a specific environment or for specific types of workloads.

4. They enable centralized management and governance, allowing organizations to maintain control over deployments and ensure compliance with regulations.

The choice between ARM templates and blueprints ultimately depends on the specific needs of the project. If the focus is on infrastructure provisioning and customization, ARM templates provide granular control.

On the other hand, if the emphasis is on governance, compliance, and enforcing standards, blueprints offer a higher level of abstraction and central management.

It is appropriate to use ARM templates when you require flexibility, customization, and fine-grained control over the infrastructure. However, if the primary concern is enforcing standards and ensuring consistency across deployments, blueprints would be a more suitable choice.

In summary, evaluate the project requirements in terms of infrastructure control versus governance needs to determine whether to use an ARM template or a blueprint for configuring the new system using existing configurations.

Learn more about Blueprints:

https://brainly.com/question/4406389

#SPJ11

What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digital cameras C. A game like Marco Polo on the Internet D. A way of tracking criminals using GPS​

Answers

Answer:

C. A game like Marco Polo on the Internet

Explanation:

A digital scavenger hunt is a name for a scavenger hunt game originally made for mobile phones and works on any operating system or mobile platforms such as Android or iOS.

The game comprises of different missions in which players are expected to complete one after the other.

Hence, in this case, the correct answer is "A game like Marco Polo on the Internet."

What kind of technology is helping people who don't have access to the internet get it? A) Airplanes B) Balloons C) Routers D) Ships

Answers

Answer: c router

Explanation:

I took a test with the same question

impacts of running the parallel algorithm on an even larger number of computers than previously

Answers

Running a parallel algorithm on an even larger number of computers than previously can have both positive and negative impacts.

On the positive side, the increased computing power can result in faster and more accurate results. The parallelization of the algorithm allows for the division of the workload among multiple computers, which can greatly decrease the time required to complete the task. Additionally, the larger number of computers can provide redundancy and fault tolerance, ensuring that the algorithm continues to run even if one or more of the computers fail.

However, there are also potential negative impacts to consider. One issue that may arise is the communication overhead between the computers. As the number of computers increases, the amount of communication required to coordinate the parallel computation may become a bottleneck and slow down the overall performance.

Learn more about parallel algorithm: https://brainly.com/question/19378730

#SPJ11

when enabling dynamic memory for virtual machines, what does the memory weight setting specify?

Answers

The memory weight setting, when enabling dynamic memory for virtual machines, specifies the priority or preference given to a virtual machine when allocating memory resources.

When dynamic memory is enabled for virtual machines, the memory weight setting determines the relative priority of a virtual machine when allocating available memory resources. Each virtual machine is assigned a memory weight value, and the higher the weight, the more likely the virtual machine will receive additional memory when resources are constrained.

The memory weight is used by the hypervisor to prioritize memory allocation among virtual machines based on their assigned weights. This allows for efficient memory management and ensures that virtual machines with higher memory weight settings receive a larger share of available memory when needed.

Learn more about memory here:

https://brainly.com/question/30273393

#SPJ11

Other Questions
Mandatory _________________ in employee contracts have been found to be generally acceptable and legal.Group of answer choicesnegotiation clausesarbitration clausesmediation clausesreprimand procedures The height of a door is about?A) 5 Feet B) 7 Feet C) 16 Feet D) 12 Inches E) 36 Inches ANSWER ASAPChris earns 9.75 per hour but he has to pay 4.15 every day for gas.Which expression shows how much Chris,c, earns in 4 days if he works h hours Mantyla's "banana/yellow, bunches, edible" experiment employed three conditions, which yielded quite different results. Describe the three conditions as well as the results of each. What do these results predict about students studying from their own notebooks versus studying from notes borrowed from a classmate? Why does it matter? The study was a test about how context helps people remember information. In one condition, people were given descriptions that they made up after seeing a list of fruits and vegetables. In another condition the cues were made up by a memory expert, in the third condition, the cues were made up by random other people. Participants remembered the most words when they used cues made up by a memory expert. Students should borrow notes to study when the note taker is doing really well in the class, this is because the A students have better memory cues. The study was a test about how context helps people remember information. After seeing a list of words, people were told to imagine how words were related to one another. Participants then made up memory cues based on their imagination. In another condition, the cues were made up by other people, and in the last condition no cues were presented. Participants remembered the most words when they used their own cues. Students should use their own notes to study, but try to imagine the concepts visually, this is because everyone's memory cues are unique to the way they store information. The study was a test about memory cues for items in a word list. In one condition, people were shown objects related to words on the list, and then made up their own memory cues, in another they saw the list but the cues were made up by other people, in the other condition, no cues were provided. Participants remembered the most words when they used their own cues. Students should use their own notes to study, but this only works if they have power point slides to focus on, this is because everyone's memory cues are unique to the way they store information. The study was a test about memory cues for items in a word list. In one condition, people were given descriptions that they made up after seeing the list, in another they saw the list but the cues were made up by other people, in the other condition, they did not see the list and the cues were made up by other people. Participants remembered the most words when they used their own cues. Students should use their own notes to study, this is because everyone's memory cues are unique to the way they store information. An atom of polonium-218 undergoes alpha decay. What new element is produced? use what you have learned about historical conflicts to craft a set of guidelines thats articulate when and how the United States should intervene in conflicts around the world. present these guidelines in the form of a proposal to a congressional committee Giving brainliest if you're rightTrue or false- Cellular respiration is a chemical process that enables organisms to convert food into energy. True or false-Animals consume food only to get energy for the process of cellular respiration.True or false-Cellular respiration is the long scientific name for respiration (breathing).True or false-Plants carry out cellular respiration using the same chemical process that occurs in animals. Estimate the angular momentum of the moon (relative to its center) due to its rotation around its axis. The radius of the moon is Rm = 1.74 X 106mits mass is Mm = 1.34 x 1022 kg. Treat the moon as a solid sphere. The formula for the rotational inertia (moment of inertia) of a solid sphere is I = MR2. Note: The moon makes one rotation around its axis for the same time that it takes to go once around the earth approximately 28 days. in what part of the body does most chemical digestion take place? A 9. 5 kg outdoor copper sculpture heats up during the day from 24C to 78 C. How much energy was absorbed? (Note: Copper has aspecific heat of 390 J/kgC. ) I need some help please A student desk measures 1.5 meters. The dry erase board measures 3.5 meters. How much longer is the dry erase board than the desk in centimeters? The data set represents the heights, in centimeters, of ten model bridges made foran engineering competition.131414161616161819What is the MAD? Solve the system of equations.5y+3x=38y+9x=12 what is the the name of a orange tree in french jim and mary jean are married and have two dependent children under the age of 13. both parents are gainfully employed and during 2022 earn salaries as follows: jim earns $150,000 and mary jean earns $5,200. to care for their children they pay eleanor (jim's mother) $5,700. assuming jim and mary jean file a joint return, what is their credit for child and dependent care expenses in 2022? Can someone give me 3 ideas please? What mL of a 0. 150 M Ca(OH)2 solution isrequired to titrate a 200. 0 mL of a 0. 060 M HClsolution to its equivalence point? which of the following terms is used to indicate that a donor provided a gift with explicit instructions that the gift is to be used for a specific purpose by the not-for-profit but the entire amount may be spent right away? group of answer choices net assets with donor restrictions. net assets without donor restrictions. endowment assets. board-designated net assets. As an object slides across a rough horizontal surface, what happens to the object'sgravitational potential energy withrespect to the surface and speed?