which of the following commands list columns of a table in ms sql? a. describe b. desc c. exec sp_tables. exec sp_columns e. all of the above f. none of the above

Answers

Answer 1

The correct option is exec sp_columns. The command that lists columns of a table in MS SQL is "exec sp_columns."

How to list MS SQL table columns?

The command "exec sp_columns" is used in MS SQL to list the columns of a table. When executed, this command retrieves metadata information about the columns within a specific table in the database.

It provides details such as the column name, data type, length, and whether it allows null values. Unlike the other options mentioned, "describe," "desc," and "exec sp_tables" do not directly provide column information.

Using "exec sp_columns" is particularly useful when you need to quickly examine the structure of a table or gather information about its columns for analysis or development purposes.

It allows database administrators and developers to understand the schema and design of a table, ensuring accurate data retrieval and manipulation. By utilizing this command, users can obtain a comprehensive view of the column attributes within a table in MS SQL. therefore the correct option is exec sp_columns.

Learn more about columns

brainly.com/question/32271388

#SPJ11


Related Questions

In Outlook 2016, what happens when users begin to type in the To field the name of an email recipient to whom they frequently send messages? The recipient’s full email address appears in the field. The recipient’s full contact information appears in a window. The address book appears and presents names to choose from. The address book appears and presents addresses to choose from.

Answers

Answer:

The recipent's full email address appears in the field.

Explanation:

Answer:

The recipent's full email address appears in the field.

Explanation:

EDGE 2023

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the life of me. Help.

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the

Answers

I don't see a difference. Otherwise, they both are correct.

Which of the following memory is faster? PC4 22400 DDR4 3200

Answers

Answer:

DDR4-3200

Explanation:

PC4 22400 is the bus speed that can get a memory upt to DDR4-2800.. sort of

The output stream variables can use the manipulator ____ to fill the unused columns with a character other than a space.
A. setchar
B. charfill
C. setw
D. setfill

Answers

The output stream variables can use the manipulator "setfill" (Option D) to fill the unused columns with a character other than a space.

The manipulator "setfill" is used in conjunction with the "setw" manipulator in C++ to set the fill character for empty or unused columns when outputting data. By default, the fill character is a space. However, by using "setfill", you can specify a different character to fill the unused columns. This is particularly useful when formatting output in a specific way, such as aligning columns or creating a visually appealing output. The "setfill" manipulator allows you to customize the fill character to suit your needs.

Option D, "setfill," is the correct answer as it accurately represents the manipulator used to fill the unused columns with a character other than a space.

You can learn more about variables at

https://brainly.com/question/28248724

#SPJ11

when internal network management traffic is isolated from user data payload traffic, this is known as .

Answers

In a physical penetration assault, a determined hacker breaks into a target organization's space and gains access to computer systems or connects a laptop to the internal network.

What does traffic for network management mean?

Network traffic management often referred to as application traffic management is a technique developed by F5 for routing network traffic to the best resource based on predetermined business policies. It involves intercepting, examining, and translating network data.

How can network traffic be decreased?

Increasing the bandwidth available will enable the network to support more data and devices at once, which will frequently lessen network congestion. Users will normally experience quicker connection speeds and fewer interruptions once you take efforts to improve your network's bandwidth.

to know more about network management here:

brainly.com/question/29025711

#SPJ1

Write a program that reads text data from a file and generates the following:
A printed list (i.e., printed using print) of up to the 10 most frequent words in the file in descending order of frequency along with each word’s count in the file. The word and its count should be separated by a tab ("\t").
A plot like that shown above, that is, a log-log plot of word count versus word rank.

Answers

Here's a Python program that reads text data from a file and generates a printed list of up to the 10 most frequent words in the file, along with each word's count in the file, in descending order of frequency (separated by a tab). It also generates a log-log plot of word count versus word rank using Matplotlib.

```python

import matplotlib.pyplot as plt

from collections import Counter

# Read text data from file

with open('filename.txt', 'r') as f:

   text = f.read()

# Split text into words and count their occurrences

word_counts = Counter(text.split())

# Print the top 10 most frequent words

for i, (word, count) in enumerate(word_counts.most_common(10)):

   print(f"{i+1}. {word}\t{count}")

# Generate log-log plot of word count versus word rank

counts = list(word_counts.values())

counts.sort(reverse=True)

plt.loglog(range(1, len(counts)+1), counts)

plt.xlabel('Rank')

plt.ylabel('Count')

plt.show()

```

First, the program reads in the text data from a file named `filename.txt`. It then uses the `Counter` module from Python's standard library to count the occurrences of each word in the text. The program prints out the top 10 most frequent words, along with their counts, in descending order of frequency. Finally, the program generates a log-log plot of word count versus word rank using Matplotlib. The x-axis represents the rank of each word (i.e., the most frequent word has rank 1, the second most frequent word has rank 2, and so on), and the y-axis represents the count of each word. The resulting plot can help to visualize the distribution of word frequencies in the text.

Learn more about Python program here:

https://brainly.com/question/28691290

#SPJ11

The required program that generates the output described above is

```python

import matplotlib.pyplot as plt

from collections import Counter

# Read text data from file

with open('filename.txt', 'r') as f:

  text = f.read()

# Split text into words and count their occurrences

word_counts = Counter(text.split())

# Print the top 10 most frequent words

for i, (word, count) in enumerate(word_counts.most_common(10)):

  print(f"{i+1}. {word}\t{count}")

# Generate log-log plot of word count versus word rank

counts = list(word_counts.values())

counts.sort(reverse=True)

plt.loglog(range(1, len(counts)+1), counts)

plt.xlabel('Rank')

plt.ylabel('Count')

plt.show()

```

How does this work ?

The code  begins by reading text data from a file called  'filename.txt '. The 'Counter' module from Python's standard library is then used to count the occurrences of each word in the text.

In descending order of frequency, the software publishes the top ten most frequent terms, along with their counts. Finally, the program employs Matplotlib to build a log-log plot of word count vs word rank.

Learn more about Phyton:
https://brainly.com/question/26497128
#SPJ4

An operation that copies a value into a variable is called a(n) ________ operation.
a. equals
b. copy
c. declaration
d. cout
e. assignment

Answers

Answer:

e

Explanation:

can
you do keyword analysis and strategy for contiki app.

Answers

Yes, keyword analysis and strategy can be done for the Contiki app. Keyword analysis is a crucial part of search engine optimization (SEO) that enables the optimization of web content for various search engines.

Keyword analysis and strategy involve conducting research to identify the most relevant keywords to target and how to use them. The analysis and strategy help in making sure that the keywords used are relevant to the content on the Contiki app. The keywords can be used on different aspects of the Contiki app, such as its title, descriptions, app content, and app screenshots.An effective keyword analysis and strategy for the Contiki app involves researching various keywords and choosing the most relevant ones to use.

The keywords chosen should have a high search volume and low competition. The keyword strategy should also include the use of long-tail keywords to enhance the app's visibility.The keyword analysis and strategy for the Contiki app should also involve monitoring and analyzing the performance of the keywords. This will help in identifying any changes or trends in user behavior and updating the keyword strategy accordingly.In summary, keyword analysis and strategy are essential for optimizing the Contiki app for search engines. By choosing the most relevant keywords and using them effectively, the app can increase its visibility and attract more downloads.

To know more about search engines visit:

https://brainly.com/question/32419720

#SPJ11

geometricTerms=a*rRowArray ; sumTerms=sum(geometricTerms)

Answers

It appears that you are trying to compute the product of a scalar value a with a row array rRowArray in MATLAB, and then compute the sum of the resulting array geometricTerms using the sum function.

Here is the corrected code with appropriate variable names and syntax:

matlab

Copy code

a = 3; % Example value for scalar 'a'

rRowArray = [2, 4, 6, 8]; % Example row array 'rRowArray'

geometricTerms = a * rRowArray; % Compute the product of 'a' and 'rRowArray'

sumTerms = sum(geometricTerms); % Compute the sum of 'geometricTerms'

In this code, a is a scalar value, rRowArray is a row array of values, and geometricTerms is the result of multiplying a with rRowArray element-wise. The sum function is then used to compute the sum of the resulting array geometricTerms, and the result is stored in the variable sumTerms. Please note that the actual values of a and rRowArray should be replaced with your desired values for the specific calculation you are trying to perform.

learn more about   rRowArray  here:

https://brainly.com/question/30907879

#SPJ11

Write whoch tabs to ise in order to view table tools

Answers

The order to view table tools such as the Design and Layout tabs is to put the insertion point in the table, so you are actively in the table. The correct option is B.

What are table tools?

You can create or modify your table using the "Design tab" (including its borders). Additionally, you can format your table in terms of how the cells are arranged.

You will find the tools you need on the "Layout tab," which is where you may organize the rows and columns.

Therefore, the correct option is B. Put the insertion point in the table so you are actively in the table.

To learn more about table tools, refer to the link:

https://brainly.com/question/14078305

#SPJ1

The question is incomplete. Your most probably complete question is given below:

What should you do in order to view table tools such as the Design and Layout tabs?

Put the insertion point in the document just after the table.

Put the insertion point in the table so you are actively in the table.

Put the insertion point in the document just before the table.

Put the insertion point at the very beginning of the document.

T/F : a successful hijacking takes place when a hacker intervenes in a tcp conversation and then takes the role of either host or recipient.

Answers

False.

A successful hijacking, also known as a TCP session hijacking or TCP session hijack attack, occurs when an attacker intercepts an established TCP connection between a host and a recipient without their knowledge or authorization.

The attacker does not necessarily take the role of either the host or the recipient but instead gains unauthorized access to the ongoing TCP session. During a TCP session hijack attack, the attacker can manipulate or inject malicious data into the communication stream, eavesdrop on the conversation, or potentially impersonate one of the parties involved. The goal is to gain control over the session and potentially exploit the compromised connection for unauthorized actions.

Learn more about TCP session hijacking here:

https://brainly.com/question/31601873

#SPJ11

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

Which principle or element of layout design is highlighted in this event poster?
i. a headline
ii. a column
iii. a sub-headline
iv. a caption

Answers

The  principle or element of layout design is highlighted in an event poster in option i: The headline.

What are the elements of page layout?

The poster is known to be one that often uses a kind of hierarchy and centered text alignment as its element.

Note that it is one whose Lines of use is said to be made up of different kinds of type styles, sizes and others.

The simple elements of an advertising poster is made up of:

1. The headline.

2. The sub-head.

3. The body copy.

4. The caption.

The elements of page layout are visual hierarchy, visual flow, and others. Hence, the  principle or element of layout design is highlighted in an event poster in option i: The headline.

Learn more about layout design from

https://brainly.com/question/2501083

#SPJ1

A program executes 15 billion instructions. You are running this program in two systems: System A: has a processor with 3 GHz and an average CPI of 2.0 System B: has an average CPI 1.2 and execution time is 1.5 X more than system A. What is the clock speed of processor in system B.

Answers

Answer:

Clock speed of B = 7.5 GHz

Given:

Processor speed of A = 3 GHz

Average CPI of A = 2

Average CPI of B = 1.2

Execution time of B is 1.5 times then A

Find:

Clock speed of B

Computation:

Execution time = CPI × Processor speed × Instructions

Execution time of B = 1.5[Execution time of A]

1.2 × Clock speed of B[15 billion] = 1.5[2 × 3][15 billion]

Clock speed of B = 7.5 GHz

make a clan using 5S of the current state of your workstation now in the computer laboratory room how are you going to manage smooth workplace

Answers

Answer:

Explanation:

Using your toilet as a trash can. ...

Taking baths and long showers. ...

Conventional showerheadsYou should consider switching to a low-flow showerhead, which uses about 2 gallons of water per minute. ...

Leaky pipes. ...

Laundry loads that are only half full. ...

Running a dishwasher that's not completely full.

Choose the types of work a person in the network systems administration field might do on a regular

basis. Check all of the boxes that apply.

troubleshooting the network when there are problems with connectivity

improving the speed of the network

helping users install word-processing software

developing video games

DONE

Answers

Answer:troubleshooting the network when there are problems with the connectivity ||||||| improving network speed

Explanation:

Answer:

a and b

Explanation:

Guy above was right :)

a computer is made up of four different types of devices which are

Answers

A computer is made up of four different types of devices which are input, storage, processing and output devices.

What are computer devices?

Computer devices are those components of computer known as the computer hardware that ensures the proper functioning of the system.

The four different types of devices found in the computer are :

Input devices: These are used to put in data into the system.

Storage device:. These are used for storage of processed data.

Processing device: This is the brain box of the computer.

Output devices: They are used to display data.

Learn more about hardware here:

https://brainly.com/question/24370161

#SPJ1

Which is true regarding diagramming? It involves writing an algorithm. It presents the programming code. It shows the flow of information and processes to solve the problem. It models solutions for large problems only.

Answers

Answer:

It shows the flow of information and processes to solve the problem.

Explanation:

Answer:

C

Explanation:

Got it right on Edge 2021:)

Your welcome

in the past 10 years, the digital divide in the united states has ____.

Answers

The digital divide in the United States has narrowed.

Over the past 10 years, there have been efforts to reduce the digital divide in the United States, and as a result, the divide has narrowed.

The digital divide refers to the gap between individuals or communities who have access to and can effectively use information and communication technologies (ICTs) such as the internet, and those who do not. In the past decade, various initiatives, policies, and advancements have been made to address this divide in the United States.

The expansion of broadband infrastructure, increased availability of affordable internet plans, and the proliferation of mobile devices have contributed to improved access to the internet for a larger portion of the population. Additionally, initiatives like ConnectED and ConnectHome, launched by the federal government, have aimed to provide internet access and technology resources to schools and low-income families.

Moreover, the increasing adoption of digital technologies in various sectors, including education, healthcare, and government services, has put more emphasis on bridging the digital divide, leading to increased efforts and investments.

In conclusion, the digital divide in the United States has narrowed over the past 10 years. While challenges and disparities still exist, initiatives aimed at expanding internet access, improving affordability, and promoting digital inclusion have contributed to reducing the gap and providing more equitable opportunities for individuals and communities to access and utilize information and communication technologies. However, ongoing efforts are necessary to ensure that everyone has equal access and the necessary digital skills to fully participate in the increasingly digital society.

To know more about digital divide visit:

brainly.com/question/13151427

#SPJ11

What can happen if you do not follow the directions when cooking or baking? (Give 4 examples in a sentence each)

Answers

Answer: 1: You will make it incorrectaly 2: It will taste terrible 3: You may break appliences 4: you may burn down your house.

Explanation:

1) According to the text, what is a common cause of collisions ?
O taking a call on a cell phone
O defensive driving
O checking your surroundings
O no answer applies
Oscanning for hazards
is a common cause of collisions.

Answers

Answer:

Taking a call on a cell phone.

According to repko and szostak, what is the term that describes the disagreement among a discipline's practitioner's over the defining elements of the discipline?

Answers

According to repko and szostak,  the term that describes the disagreement among a discipline's practitioner's over the defining elements of the discipline is option D- Cognitive Discord.

What is the relationship between interdisciplinarity and the disciplines?

Based on the words of Quoting Jantsch, “Interdisciplinarity is known to be a well used axiomatics for a set of disciplines is seen at a higher level and  this concept is one that can be used to co-ordinate or handle the disciplines.”

Note that Mono or multi - interdisciplinarity is one that is aim at role or duties concerning one or a lot of concrete cases.

Hence, According to repko and szostak,  the term that describes the disagreement among a discipline's practitioner's over the defining elements of the discipline is option D- Cognitive Discord.

Learn more about disagreement from

https://brainly.com/question/955691

#SPJ1

See options below

A- Metanarrative

B- Perspective taking

C- Epistemic norms of a discipline

D- Cognitive Discord

the data processing method used by fedex to track packages is an example of group of answer choices real-time processing. batch processing. online batch processing. real-time batch processing.

Answers

Data is processed practically instantly using real-time processing. This procedure doesn't involve any waiting or pausing.

Real-time processing: What is it?

Real-time processing is a technique that virtually immediately processes data. This procedure doesn't involve any waiting or pausing. As soon as data enters these systems, it is processed, and the processed data is output. Real-time processing typically needs a constant flow of data due to its nature. Data streaming, radar systems, customer service systems, and bank ATMs are excellent examples of real-time processing in action, when prompt processing is essential to the effective operation of the system. Real-time processing works really well with Spark. the precise period of time that something occurs. Data may be partially analyzed by the computer in real time (as it comes in) March, R. H.

To learn more about Real-time processing refer to

https://brainly.com/question/22527518

#SPJ4

Data is processed practically instantly using real-time processing. This procedure doesn't involve any waiting or pausing.

What is Real-time processing?Real-time processing is a technique that virtually immediately processes data. This procedure doesn't involve any waiting or pausing. As soon as data enters these systems, it is processed, and the processed data is output. Real-time processing typically needs a constant flow of data due to its nature. Data streaming, radar systems, customer service systems, and bank ATMs are excellent examples of real-time processing in action, when prompt processing is essential to the effective operation of the system. Real-time processing works really well with Spark. the precise period of time that something occurs. Data may be partially analyzed by the computer in real time (as it comes in) March, R. H.

To learn more about Real-time processing refer to:

brainly.com/question/22527518

#SPJ4

In collaborative learning, the teachers teach by:

Answers

Answer:

Collaborating with the students and working with them in a hands-on learning environment.

What should you do first to best use your personal goals as a means for a promotion? research how your company offers promotions show professional behavior at all times set both short and long-term personal goals make sure some goals are only for personal growth

Answers

Answer:

C. set both short and long-term personal goals

This would better the way that you work, making you more useful and better for promotions.

a server is a special kind of computer that manages access to resources such as files, applications, peripherals, emails, and webpages

true or false

Answers

Answer:

true

Explanation:

The answer to this question is true

Two forms of compression are lossy and lossless. State giving reasons which
would be the most suitable form of compression to use when transmitting:
(i) a draft manuscript for a book.
(ii) A video recording which you have made of the school play.

Answers

Answer:

(i) When transmitting a draft manuscript for a book, the lossless compression technique is most suitable because after decompression, the data is rebuilt and restored in its form as it was from where it originated

(ii) When transmitting a video recording which you have made of the school play, a lossy compression technique is most suitable because the large size of video files require the increased data carrying capacity which is provided by the lossy transmission technique. The quality of the video can be reduced without affecting the message intended to be delivered

Explanation:

Next, Leah wants to add a content slide that allows her to insert a table.
Which tab should she click to complete this action? Home
What should Leah click to open a dialog box to select the slide she needs? New Slide down arrow
What should Leah do to access the notes pane of the slide she added? V Click Notes expander.
Multi media design

Answers

Answer:

1. Home

2. New slide down arrow

3. Click Note expander

Explanation:

Home tab should she click to complete this action.

The New Slide down arrow should Leah click to open a dialog box to select the slide she needs.

Click Notes expander should Leah do to access the notes pane of the slide she added.

What is a content slide?

A collection of polished presentation templates is called the Presentations Content Slides. The site provides stunning infographics and PowerPoint illustrations that are laid out in a bullet point structure. Regardless on how many evaluation tools are provided, the main layout is one to three.

Select the button next to "New Slide" on the Home tab. Choose the layout visitors want and a new slide from the layouts collection.choose "New Slide" Make your layout selection in the New Slide dialogue box for any new slide. Study slide layouts in more detail.You can add extra information to presentations that doesn't show up on slides in the Notes pane.

Learn more about content slide, here:

https://brainly.com/question/4214795

#SPJ6

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point

Answers

Answer:

Evil twin AP

Funny name, yes, but this is actually a not-so-funny term for an AP set up by an attacker, mimicking your AP, and using this method to attack your client devices and networks.

Please thank me if you are reading this, and have a good day.

csma/cd is used at the data-link layer for passing data on an ethernet network. it helps to regulate this function. TRUE/FALSE

Answers

This statement is true because CSMA/CD plays a crucial role in regulating the transmission of data on an Ethernet network, ensuring efficient and reliable communication by managing access to the shared communication medium.

What is Carrier Sense Multiple Access with Collision Detection?

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a protocol used at the data-link layer of the Ethernet network to regulate and manage the transmission of data. CSMA/CD helps to avoid and detect collisions that can occur when multiple devices on the network attempt to transmit data simultaneously.

CSMA/CD works by requiring devices to listen and sense the network before transmitting. If the network is idle, the device can transmit its data. However, if the device detects that another device is already transmitting, it waits for the ongoing transmission to finish before attempting to transmit its data. This helps to regulate and prevent data collisions.

In the event that two devices transmit data simultaneously and a collision occurs, CSMA/CD provides collision detection mechanisms. When a collision is detected, both devices stop transmitting, wait for a random backoff period, and then retry the transmission.

Therefore, CSMA/CD plays a crucial role in regulating the transmission of data on an Ethernet network, ensuring efficient and reliable communication by managing access to the shared communication medium.

Learn more about CSMA/CD

brainly.com/question/13260108

#SPJ11

Other Questions
The radius of a circle is 16 miles. What is the circle's circumference? High School Geometry Gretchen earned $500 from her summer job. She made a list of things that she wants to do with the money she earned. There are a number of ethical concerns involving DNA. These include DNA profiling and DNA fingerprinting. Pick one of these topics and find three Internet resources discussing the topic. Then answer the following questions:What is DNA profiling or DNA fingerprinting?What are the benefits of the practice?What are the disadvantages?Both of these issues involve a lot of money. What are the financial issues related to DNA profiling or DNA fingerprinting? How should we weigh the interests of the DNA industry vs. the rights of the individual and the rights of the people?For each of your sources, indicate where the author or site stands on the issues. Unlike viruses and bacteria, neurotoxins: Write a sentence using the word paleobiology (CANNOT BE A DEFINITION) Find the reciprocal of 123 find the circumference of the pizza to the nearest whole number. (7 in) item 4How did Jacksonian Democracy affect wealthy bankers?They gained power and money from the Second National Bank.They lost the right to vote in some elections.They agreed to be more generous to common people.They lost some of their power in government. Which of the following statements is accurate?A: You can never get more energy out of a system than you put into a system. B: The energy out of a system is always MORE than the energy input. C: The energy out of a system is always EQUAL to the energy input. Cuando viajes, recuerda que en muchos pases desarrollados, ________ los cigarros en lugares pblicos cerrados. se permiten se permitan se prohben se prohiban if a student is selected at random, find the probability the student is a junior. round to the nearest whole percent! im not good at probability so an explaination would be appreciated!!! Q. A mechanic has a radiator hose thatmeasures 32 feet long. It needs to be cut intopieces equaling 5 feet 3 inches. How manywhole pieces can it be cut into?A. 4 piecesB. 6 piecesC. 7 piecesD. 8 pieces report on any available increase in population !!!!!!!!!! Why do growth rates appear to be declining in many human populations? From the set {232, 360, 464}, use substitution to determine which value of x makes the equation true. x 4 = 87 If a + b 8 and a = 2, then b 5.Which of the following would be a counterexample? Flux is a measure of ________________. these measurements precisely and objectively define the _______ of starlight What is GDP per capita?A. The average amount of money in people bank account.B. A country gross domestic product divided by its populationC. The percentage of people over the age 55 who can read and writeD. The value of all final goods and services producted within a country in a given year bro yall need to not make a subscripton to this im in 12th grade this helps me soo much