a- the stored procedure will be named getcustomerinfo. b- add one in parameter called incustomeremail with a data type of varchar(254). c- inside the sproc body, declare a variable called tempcustid with a data type of int. d- set the tempcustid variable to the result of a subquery that selects customerid from the customeremails table where emailaddress

Answers

Answer 1

Add one IN variable with the name inCustomerEmail and a VARCHAR data type (254). Declare a variable with a data type named tempCustId inside the sproc's body.

What does the word "emailaddress" mean?

A recipient email box identified by an email address is where messages are sent. While the addressing formats used by early communications systems varied, email addresses now adhere to a set of precise guidelines that were first defined by the Internet Protocol (IETF) inside the 1980s and modified by Html 5322 and 6854.

Do mailing addresses and email addresses match up?

It is delivered to the people we wish to receive the message. It is possible to share and discuss messages and topics of all kinds. While a mail list is a collection of people who share a common interest.

To know more about email address visit:

https://brainly.com/question/14714969

#SPJ4


Related Questions

Part 2: East Pacific Ocean Profile Uncheck all of the boxes. Check the box next to the East Pacific Ocean Profile Line under the heading Profile lines. Then, double-click on the text for the East Pacifec Ocean Profile Line. This line goes from the Pacific Ocean to South America. Under the Edit menu and select 'Show Elevation Profile. Last, check the box next to Terrain in the preloaded Layers section. Position the mouse along the profile and the specific depth/elevation information is displayed. Use the mouse to pinpoint the location of sea-level near the South American coast. Question 5 Which is the MOST prominent feature in this profile? midiocean ridge deep ocran trench Question 6 Using the coloced lines displayed by the Present Plate Boundaries layer, what tyde of plate boundaries borders South Arverica? Gverent conversent transfonl Using figure 9.16 from your textbook, what three plates interact with this profile? North American Plate South American Plate African Plate Eurasian Plate Australian Plate Pacific Plate Cocos Plate Caribbean Plate Nazca Plate Filipino Plate: Scotia Plate Question B Tum on the USGS Earthquikes tyer - to view the data, be sure to be roomed in to an Eye At of 4000 kim or less. Describe the depth of eartheaskes that occur in the vicinity of the two plate boundaries are the earthuakes deep (300−800 km, intermedate (70−300kini and / or athallow (0-70 km)? ichoose all that apply'd dee(300−000in) intermedute 50.790 km that 10 io-rokes

Answers

The most prominent feature in the East Pacific Ocean Profile is the Mid-ocean ridge.Question 6The type of plate boundaries that borders South America are Transform plate boundaries.

The three plates that interact with the East Pacific Ocean Profile are the North American Plate, Pacific Plate, and South American Plate.

Question BThe depth of earthquakes that occur in the vicinity of the two plate boundaries are:Intermediate (70-300 km)Shallow (0-70 km)Therefore, the depth of earthquakes that occurs in the vicinity of the two plate boundaries are intermediate and shallow.

To know more about East Pacific Ocean visit:

brainly.com/question/33795142

#SPJ11

Write a program that reads a string from the user containing a date in the format mm/dd/yyyy. It should print the date in the format April 25, 2020. You may assume the date entered is valid and that there is always exactly 2 digits for month and day.

Answers

The program illustrates the use of list slicing

The program in Python where comments are used to explain each line is as follows:

#This initializes all months

monthList = ["January","February","March","April","May","June","July","August","September","October","November","December"]

#This gets input for date

ddate = input("Date: ")

#This extracts the month from the input date

month = monthList[int(ddate[0:2]) - 1]

#This prints the date in the required format

print(month+" "+ddate[3:5]+", "+ddate[6:10])

Read more about list slicing at:

https://brainly.com/question/16397886

flatbed, document, and portable are types of blank that accept documents and convert them into machine-readable form.

Answers

Scanner is used for converting documents into machine-readable form.

What is Scanner?

For computer editing and presentation, a scanner is a device that extracts pictures from photographic prints, posters, magazine pages, and other sources. Using optical character recognition, scanners turn the image on a page into digital data that can be saved on a computer (OCR).

What is OCR?

The procedure used to transform an image of text into a machine-readable text format is known as optical character recognition (OCR). Your computer will save the scan as an image file, for instance, if you scan a form or a receipt.

Scanner work :

The glass scanning plate is topped with the object to be scanned.The logic board receives instructions from the computer regarding how fast and how far the motor should go.The scanning device is put into the proper position according to the logic board instructions so that scanning can start.The pace at which the scanning unit traverses the image to be scanned is determined by the logic board command.A light source shines on the image while the scanning equipment moves across it.A sequence of mirrors reflect the light after it strikes the image, which is then reflected back to the scanner lens.The CCD sensors receive the light after it travels through the scanner's lens.An ADC, or analog to digital converter, converts the analog voltage to digital values.The logic board receives the digital signals from the CCDs and transmits them back to the computer.

Learn more about Scanner click here:

https://brainly.com/question/24937533

#SPJ4

Shonda just wrote an If statement, but it does not work. Which of the following changes should she make to fix her code?

A. Add a period to the end of the first line of her if statement.

B. Add a colon to the end of the first line of her if statement.

C. Make sure the word “if” is capitalized.

D. Add parenthesis around the condition of the if statement.

Answers

Answer:

B  Add a colon to the end of the first line of her statement

Explanation:

its needs a colon at teh end

Evan was pitching a new product at the trade show. He knew that he'd only have a limited amount of time to convince attendees of the value of his product. He spent a lot of time preparing a presentation for his pitch. His preparations paid off, and he made a record number of sales. Evan likely used these strategies when creating his presentation. Transitions matched the presentation content. Transitions matched the presentation content. Lots of different animation styles were used. Lots of different animation styles were used. Animations were limited to one per slide. Animations were limited to one per slide. Each slide had a different sound effect. Each slide had a different sound effect. Animations and transitions were consistent. Animations and transitions were consistent.

Answers

The strategies  that Evan will likely used these strategies when creating his presentation are:

Transitions matched the presentation content: This means that the transitions between slides were smooth and coherent, and that they helped to guide the audience's attention from one point to the next.

Animations were limited to one per slide: Using too many animations can be distracting and overwhelming for the audience, so it is important to use them sparingly and only when they add value to the presentation.

Animations and transitions were consistent: Using a consistent style for animations and transitions helps to create a cohesive, professional-looking presentation.

What is the presentation about?

Below are some additional strategies that Evan might have used:

Lots of different animation styles were used: Using a variety of animation styles can help to keep the audience engaged and prevent boredom.

Lastly, Each slide had a different sound effect: Adding sound effects can help to emphasize key points or add interest to the presentation, as long as they are used sparingly and appropriately.

Learn more about presentation from

https://brainly.com/question/30125837

#SPJ1

what is a cell address in xsl sheet

Answers

Answer:

cell address is the exact location of a particular cell of ms-excle

Explanation:

A1 refers to first row and first column.

A2 refers to second row first column.

i.e.

in 'A1' : 'A' indicate column { A= first column, B= second

column, C= third column. and soon.....}

'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}

What methods do you use when researching a complicated or difficult subject? What tools are most useful to narrowing down and validating your research? Explain your answers.

Answers

you use observation and take down notes of what is going on, you then record your notes and use this to help u further your research

List some of the benefits and challenges that come with using metering mode in the camera

Canon camera

Answers

Answer:

What is the use of metering in camera?  

Metering is used to measure the brightness of the subject. The camera optimizes exposure by adjusting shutter speed, aperture (f-number), and ISO sensitivity according to the brightness of the subject, which is measured using the camera's built-in metering sensor.

Explanation:

If the answer is right Can you mark me as brainliest if you can?

Qué parte del cuerpo humano se. Compara la torre es la torre la de tecnologia

Answers

The comparison of the tower to a part of the human body may depend on the context or the perspective of the person making the comparison.

In general, the tower may be compared to various parts of the human body, depending on its characteristics or functions. For example, the tower's height and vertical structure may be compared to the spine, the tower's antennas or sensors may be compared to the senses (e.g., eyes, ears), and the tower's ability to transmit or process information may be compared to the brain or nervous system. However, the phrase "technology tower" may specifically refer to a type of tower used for communication or data transmission, such as a cell phone tower or a broadcast tower. In this case, the tower may be compared to the human hand, as it is the part of the body often used to hold and operate a device that uses such technology.

To learn more about functions click here

brainly.com/question/13384972

#SPJ4

Complete question

What part of the human body is compared to the tower, is it the technology tower?

PYTHON HELP!
Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

If you want a loop that continually asks the user what type of pet they have until they input 'stop'...

You could use this loop:

while True:

response = input('What type of pet do you have? ')

if response == 'stop':

break

else:

print(f'You have one {response}. Total # of Pets: 1')

What guidance is available for marking sensitive compartmented information cyber awareness.

Answers

The guidance for marking sensitive compartmented information (SCI) are:

Mark the sensitive compartmented information (SCI) documents appropriately.The listing of information in an alphabetical order.The use of an approved sensitive compartmented information (SCI) fax machine.

What is a sensitive compartmented information?

A sensitive compartmented information (SCI) can be defined as a United States program that was established to segregate and categorize classified (highly sensitive) information concerning or derived from methods, analytical processes and intelligence sources, into distinctive compartments for added protection when disseminated or distributed across board.

In accordance with cyber awareness, the dissemination of all sensitive compartmented information (SCI) documents must be handled within formal access control systems only and under the directives of the Director of National Intelligence.

Based on national intelligence, the guidance for marking sensitive compartmented information (SCI) include:

Mark the sensitive compartmented information (SCI) documents appropriately.The listing of information in an alphabetical order.The use of an approved sensitive compartmented information (SCI) fax machine.

Read more on SCI here: https://brainly.com/question/25194168

Answer:

security classification guide

Explanation:

Which of the following is hardware or software that monitors and controls network traffic to prevent security breaches?
O trojan horse
O firewall
O anti-malware
O keylogger
Need answer now!!!!!

Answers

Answer:

Firewall

Explanation:

A trojan horse and keylogger are types of malware. While an anti-malware software may come with a firewall built in, the firewall is still the thing monitoring network traffic.

the process of creating simple data structures from more complex ones, which yields a data model that is very stable and useful across many different requirements, is called:

Answers

The process of creating simple data structures from more complex ones, which yields a data model that is very stable many different requirements is called: normalization.

Database normalization :

Database normalization or database normalisation is the technique of structuring a relational database according with a sequence of so-referred to as everyday bureaucracy so that you can lessen records redundancy and enhance records integrity.Normalization or normalisation refers to a technique that makes some thing extra everyday or regular.

Most usually it refers to: Normalization (sociology) or social normalization, the technique thru which thoughts and behaviors which can fall outdoor of social norms grow to be seemed as "everyday". Normalization is the technique of organizing records right into a associated table; it additionally removes redundancy and will increase the integrity which improves overall performance of the query. To normalize a database, we divide the database into tables and set up relationships among the tables.

Learn more about database normalisation :

brainly.com/question/29690680

#SPJ4

Primary storage is the computer's main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU.

a) true

b) false

Answers

The given statement that reads "Primary storage is the computer's main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU." is true.

Explanation: Primary storage is the computer's main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU. Primary storage is classified into two types: volatile and non-volatile. RAM and cache memory are volatile, whereas read-only memory (ROM) is non-volatile. RAM (Random Access Memory) is a type of volatile memory that can be accessed quickly, making it ideal for use in a computer's primary storage. Cache memory, also known as CPU memory, is a high-speed memory that stores frequently accessed information by the CPU. ROM (Read Only Memory) is a type of non-volatile memory that can't be modified.

Learn more about RAM here,For which purpose is RAM used?

A.

storing data permanently

B.

getting directions for start up

C.

processing data ...

https://brainly.com/question/13748829

#SPJ11

Find the 66th term of the arithmetic sequence
25,10,−5

Answers

Answer:

the answer is 33825

Explanation:

Answer:

-950

Step-by-step explanation:

Arithmetic sequence=a+(n-1)d

a=first number

n=nth term

d=difference

a=25

n=66

d=-15

So let's solve

25+(66-1)(-15)

25+(65)(-15)

25-975

-950

So the 66th terms is -950

The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence process include _____________, _______________, and _______________.

Answers

The people, procedures, etc. needed to create computer systems that can simulate human intelligence process include learning, reasoning, and self-correction .

What is artificial intelligence system?

This is known to be a type of system that is made use of people, procedures, hardware, software, etc. to create a type of computer systems and machines.

Conclusively, Know that they  often influence human intelligence processes, by  in the area of learning (the getting of information and methods for using the information), reasoning (thorough the use of laws or rules to come to a conclusion), and self-correction (through the use of different occurrences or outcome from one event to boast its performance on future times).

Learn more about  human intelligence from

https://brainly.com/question/9786721

What evolution has cryptography grown since sample passwords? Name 5.

Answers

Answer:

Encrypting Company Devices. ...

Securing Email Communications. ...

Protecting Sensitive Company Data. ...

Encrypting Databases. ...

Securing a Website.

Explanation:

What features in Excel are the same as in Word?
What features are differ?

Answers

Answer:

Following are the difference and similarity between word and Excel:

Explanation:

The similarity in word and excel:

The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the  Spreadsheet (tablet program).  In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.

The difference in word and excel:

In a word, it includes an application for text processing, and excel would be used for the tablet program.  The word is used to create documents like assignments file data files,  while excel is being used for the manipulation of numbers by mathematical equations.

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.

Answers

Here is a suggested infographic on internet safety practices using Microsoft Word:

[A Word document shows the following infographic:]

Staying Safe Online

Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.

Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.

Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.

Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.

Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.

Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.

Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.

Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.

Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!

Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.

A brief overview of some important internet safety practices that you can include in your infographic  using the Word Processing Software is given.

How to explain the information

Use strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.

Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.

Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.

Learn more about Word Processing on

https://brainly.com/question/985406

#SPJ1


Choose all of the items that represent features of
smartphone apps.
large applications
sold online
available for all major smartphone operating
systems
address a specific user need
there are no restrictions on app developer

Answers

Answer:

B, C, and D

Explanation:

hope this helps!

Create a flowchart to find the total of 10 negative numbers start from -1.

Answers

Here is a simple flowchart to find the total of 10 negative numbers starting from -1:

```

Start

Set total = 0

Set counter = 1

While counter <= 10

|

├─ Yes ─┬─→ Add counter to total

│ ↓

│ Increment counter by 1

├─ No ──┬─→ Display total

End

```

In this flowchart, we start by initializing the total to 0 and the counter to 1. Then, we enter a loop that continues as long as the counter is less than or equal to 10. Inside the loop, we add the current value of the counter to the total, and then we increment the counter by 1. Once the loop finishes, we display the total.

\(\huge{\mathfrak{\colorbox{black}{\textcolor{lime}{I\:hope\:this\:helps\:!\:\:}}}}\)

♥️ \(\large{\textcolor{red}{\underline{\mathcal{SUMIT\:\:ROY\:\:(:\:\:}}}}\)

what is application software?

Answers

Answer:

In information technology, an application ( app ), application program or application software is a computer program designed to help people perform an activity. Depending on the activity for which it was designed, an application can manipulate text, numbers, audio, graphics, and a combination of these elements.

Answer:

A set of programs that are used to solve particular problems of the user through computer is called application software.

Which of the following key combinations opens the Task Manager?
A
CTRL + ALT + SHIFT.
B
SHIFT + F5.
C
WINDOWS LOGO + PAUSE/BREAK.
D
CTRL + SHIFT + ESCAPE.

Answers

The key combinations that can open the Task Manager are: D. CTRL + SHIFT + ESCAPE.

What is the task manager?

The task manager is that part of the computer software that contains the list of active programs and tasks that the user was working on before or during a task.

The fastest way to get to the task manager without using the mouse will be by holding down the control, shift, and escape buttons simultaneously. So, option D is right.

Learn more about task managers here:

https://brainly.com/question/29110813

#SPJ1

Under The News And Views Section, Explain Why Crypto Transactions Require So Much Energy (Electric Power). Approx 200 Words Or Less.
What is cryptocurrency? Based on the materials placed under the News and Views section, explain why crypto transactions require so much energy (electric power). Approx 200 words or less.

Answers

Crypto transactions require so much energy (electric power) because they rely on a process called mining, which is fundamental to the functioning of cryptocurrencies like Bitcoin.

Mining is the process through which new coins are created and transactions are verified and added to the blockchain, which is a decentralized ledger that records all transactions. In order to mine new coins and validate transactions, powerful computers must solve complex mathematical problems. These problems require significant computational power and energy consumption.

The energy-intensive nature of crypto transactions can be attributed to two main factors. Firstly, the mining process requires a large number of computational calculations to be performed rapidly. Miners compete with each other to solve these calculations, and the first one to find a solution is rewarded with newly minted coins. As a result, miners use powerful hardware and consume substantial amounts of electricity to increase their chances of success.

Secondly, the security of cryptocurrencies relies on the decentralized nature of the blockchain. To prevent fraudulent activities and maintain the integrity of the system, a large amount of computational power is required to validate and confirm transactions. This distributed consensus mechanism, known as proof-of-work, ensures that the majority of the network agrees on the state of the blockchain.

Learn more about Mining

brainly.com/question/13327627

#SPJ11

contoso's application development team has been tasked with building a mobile app that can interact with users spoken and written language. which service should they choose?

Answers

The application development team at Contoso has been charged with creating a mobile app that can interact with users' spoken and written language. They should choose azure cognitive services.

What is mobile app?
A mobile application, sometimes known as an app, is a computer programme or software application that is meant to run on a mobile device such as a phone, tablet, or watch. Mobile applications are frequently distinguished from desktop programmes, which are intended to operate on desktop computers, and web applications, which are intended to run via mobile web browsers rather than directly on the mobile device. Apps were originally intended for productivity aids such as email, calendar, and contact databases, but public demand for apps resulted in rapid expansion into other areas such as mobile games, factory automation, GPS and location-based services, order-tracking, and ticket purchases, resulting in millions of apps now available. Many apps necessitate Internet access.

Azure Cognitive Services are APIs, SDKs, and services that enable developers to create intelligent apps without prior AI or data science training.

To learn more about mobile app
https://brainly.com/question/26264955
#SPJ4

Int = int(input())
float= float(input())
character = (input())
string = (input())

print('enter integer (32 - 126):\n',int)
print('enter float:\n',float)
print('enter character:\n',character)
print('enter string:\n',string)



print(int, float, character, string)
print(string, character, float, int)
print(int, 'converted to a character is c')


the output is this:

enter integer (32 - 126):
99
enter float:
3.77
enter character:
z
enter string:
howdy
99 3.77 z howdy
howdy z 3.77 99
99 converted to a character is c

what am i doing wrong?

Answers

There is no error in the code. The code is asking for user inputs and then prints out the inputs as well as a statement based on the integer input.

What is code?

Code is a set of instructions, written using a programming language, that tells a computer or other device how to perform a specific task. Code is often used to create software programs, websites, and apps that can be used to automate tasks, create new capabilities, or control devices. It is used to develop everything from simple games to complex business applications. Code is written in many different languages, such as Java, C++, HTML, and others, with each language having its own syntax and rules.

To learn more about code
https://brainly.com/question/28338824
#SPJ4

shivam has a broken laptop screen and needs to replace the screen. while doing research to find a new screen, he discovers that the laptop screen he is replacing does not have a backlight. what kind of screen does shivam need to order for his laptop?

Answers

OLED would be the next logical jump, but the per-inch cost is still massive and it'll probably be usurped by LED-backlit for consumer goods. Perhaps you could investigate the few remaining SED manufacturers…

Credit: https://superuser.com/questions/149355/are-there-computer-monitors-that-dont-use-backlight-technology

Which printing option results in a word document with images of the slides and an area to take notes

Answers

Answer:

handout is the correct answer

Explanation:

on edge

Answer:

It's C - Handout

on edge 2021

Explanation:

a system architect is looking for the tool that can be used to find compliance information that relates to the aws cloud platform. what should the system architect use?

Answers

As a system architect, you should use the AWS Artifact to locate compliance information that is linked to the AWS Cloud platform.

AWS Artifact is a portal that offers on-demand access to AWS compliance information. These reports assist AWS customers and auditors in gaining insights into the AWS environment's compliance position.

Artifact has two different classes of reports: those that are self-service and those that are managed.

Self-service reports: AWS Artifact provides AWS customers with a self-service means of downloading an audit report. The following reports are available on-demand through Artifact: Amazon Compliance Reports Service Organization Control Reports (SOC) - SOC 1, SOC 2, and SOC 3 Payment Card Industry (PCI) Reports Other Compliance Reports, including General Data Protection Regulation (GDPR), ISO, and more.

Managed reports: AWS customers can also download a select group of compliance reports that AWS manages on their behalf. AWS's management of these reports entails coordinating audit schedules, tracking completion status, and notifying customers of available audit reports. Customers must fill out a service request form to obtain these reports.

Seeing that AWS is committed to securing its cloud-based environment, compliance information is readily accessible through the AWS Artifact platform. AWS Artifact, being a platform that hosts reports of AWS's compliance position, has an excellent collection of compliance information about the AWS Cloud platform.

To learn more about the AWS Cloud platform:https://brainly.com/question/30185667

#SPJ11

Other Questions
Petty Cash Fund EntriesJournalize the entries to record the following:Check No. 12-375 is issued to establish a petty cash fund of $500.The amount of cash in the petty cash fund is now $40. Check No. 12-476 is issued to replenish the fund, based on the following summary of petty cash receipts: office supplies, $212; miscellaneous selling expense, $156; miscellaneous administrative expense, $61. (Because the amount of the check to replenish the fund plus the balance in the fund do not equal $500, record the discrepancy in the cash short and over account.)Petty Cash Fund EntriesJournalize the entries to record the following:Check No. 12-375 is issued to establish a petty cash fund of $500.The amount of cash in the petty cash fund is now $40. Check No. 12-476 is issued to replenish the fund, based on the following summary of petty cash receipts: office supplies, $212; miscellaneous selling expense, $156; miscellaneous administrative expense, $61. (Because the amount of the check to replenish the fund plus the balance in the fund do not equal $500, record the discrepancy in the cash short and over account.)a. Journalize the entry to establish the petty cash fund. If an amount box does not require an entry, leave it blank.b. Journalize the entry to replenish the petty cash fund. If an amount box does not require an entry, leave it blank. which two factors will increase the rate of solution of a salt in water?A. Chilling the mixtureB. Decreasing the amount of solventC. Heating the mixtureD. Stirring the mixture what special considerations are necessary for a heart transplant which are not necessary for a kidney transplant? Read this advertisement and select the correct answer.Advertisement containing this information: PUBLICIT Accdez plus de 10. 000 stations radios gratuites avec cette radio Wi-Fi! Le Cosmopolit Web donne accs prs de 10. 000 webradios du monde. Deux modes de connexion, Wi-Fi et Ethernet Branchez votre radio au modem de votre fournisseur d'accs internet par liaison Wi-Fi ou par cble Ethernet et coutez les missions de webradios. Pour vous retrouver dans ces 10. 000 webradios, les stations sont classes par continent, par pays et par style de musique, Rock, jazz . Il est aussi possible de crer une liste de stations de radio favorites via le service liveradio.fr. Accs aux archives musicales stockes sur un ordinateur via connexion Wi-Fi et Ethernet, audio streaming. Un port USB en faade de cette radio permet de brancher une cl USB, un ou un disque dur externe afin de lire leur contenu musical. Le Cosmopolit Web cote seulement 129,25 EuroComment les stations de radio sont-elles organises? They are not in a special playlist. They are organized by style only. They are organized by country and continent. They are organized by country, style, and continent. (a b c d e f g) Considering (46) design synchonous sequence detector circuit that one-bit serial input detecks abcdefg from a one-bit stream applied to the input of the circuit with. each active clock edge. The sequence detector should detect overlapping sequences. a = _a-) Derive the state diagram, describe the meaning of each state clearly. Specify the type of the sequential circuit (Mealy or More), The sequence shown in this graph is an example of which constitutional principle? Assume trucks arriving for loading/unloading at a truck dock from a single server waiting line. The mean arrival rate is two trucks per hour, and the mean service rate is seven trucks per hour. Use the Single Server Queue Excel template to answer the following questions. Do not round intermediate calculations. Round your answers to three decimal places. a. What is the probability that the truck dock will be idle? b. What is the average number of trucks in the queue? truck(s) C. What is the average number of trucks in the system? truck(s) d. What is the average time a truck spends in the queue waiting for service? hour(s) e. What is the average time a truck spends in the system? hour(s) f. What is the probability that an arriving truck will have to wait? g. What is the probability that more than two trucks are waiting for service? what is a non colinear point an isolated, parallelplate capacitor carries a charge q . if the separation between the plates increases by a factor of 3, the electrical energy stored in the capacitor will: 7100 dollars is placed in an account with an annual interest rate of 7.75%. How much will be in the account after 30 years, to the nearest cent? stavrinidou, e. et al. direct measurement of ion mobility in a conducting polymer. adv. mater. 25, 44884493 (2013). megan has had pleasurable sex for a number of years. she has recently begun a new relationship, and although she loves her new partner, she has been unable to reach orgasm with him. his method of lovemaking is different from her previous partner's, making her less comfortable and relaxed with him. what advice would a sex therapist most likely give megan? Part C: The discount price of a hat is $18. What is the regular price?The regular price is $ Initially, the market price is p=15, and the competitive firm's average variable cost is 19, while its average cost is 22. Should it shut down? Why? This firm should A. not shut down because average fixed cost is less than the market price. B. not shut down because average cost is greater than average variable cost. C. shut down because average cost is greater than the market price. D. shut down because average fixed cost is less than the market price. E. shut down because average variable cost is greater than the market price. Why doesn't the earth block out the light between the sun and the moon during a normal month One mole of potassium permanganate, KMnO4, contains how manygrams of oxygen. The theory of island biogeography suggests that species richness is affected by which of the following factors? I. Island distance from mainland, II. How the island is formed, III. Island size. (a) I only, (b) II only, (c) III only, (d) I and III, (e) II and III. sorbitol is . group of answer choices a. used in candies and gumsb. a sugar alcohol all of these c. choices are correct. d. absorbed and metabolized more slowly than glucose and other sugars a _____an order of actions or events. Identify this sentence as declarative, interrogative, imperative, or exclamatory.Oh that my ways were directed to keep thy statutes