Not sure what is going on, I cant remove the primary key.
s/#sql-66e_24' to './QuantigrationUpdates/Collaborator' (errno: 150) s/#sql-66e_24' to './QuantigrationUpdates/Collaborator' (errno: 150)

Answers

Answer 1

The error message you're encountering suggests that there is an issue with removing a primary key constraint in your database. The "errno: 150" refers to a specific error code related to foreign key constraints in MySQL.

When removing a primary key constraint, you need to ensure that there are no existing foreign key references to the primary key column you are trying to remove. Foreign key constraints establish relationships between tables, and if there are references to the primary key you want to remove, MySQL will prevent its deletion to maintain data integrity.

To resolve this issue, you should check if there are any foreign key constraints that reference the primary key column you want to remove. If there are, you will need to remove or modify those foreign key constraints first. Once the foreign key constraints are handled, you should be able to remove the primary key constraint successfully.

It's important to carefully analyze your database structure and the relationships between tables to ensure that removing a primary key constraint does not cause any unintended consequences or data inconsistencies.

Learn more about database here

https://brainly.com/question/24027204

#SPJ11


Related Questions

Digital signals transmit zeros and ones through changes in

frequency

light intensity

voltage

Answers

Voltage hope this helps

Answer

voltage

Explanation:

the other person is correct i got a 100 % thanks to them

give some examples where military needs have influenced technological development

Answers

Answer:

Satellite Systems,

Autonomous Vehicles

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

what advice would you give a parent about home care of a child with croup

Answers

Croup is a respiratory disease that affects children aged 6 months to 3 years. Its symptoms include a barking cough and a raspy voice. This illness can be treated with home care, but it is always best to seek medical advice from a doctor.

The following are some home care advice for parents with a child with croup:-

1. Ensure the child is well hydrated: One of the main goals of home care is to keep the child well hydrated. Fluids can be given in small, frequent sips to prevent dehydration.

2. Use a humidifier: When the air is dry, croup symptoms are likely to worsen. A humidifier or a steamy bathroom can help alleviate symptoms and soothe a child's cough.

3. Avoid irritants: Cigarette smoke and other irritants should be avoided since they can make the condition worse.

4. Give medications: Acetaminophen or ibuprofen can be given to reduce a fever or pain.

5. Ensure the child rests: It's crucial that the child gets plenty of rest. This will aid in their recovery from the illness.Finally, if the child is experiencing severe symptoms, difficulty breathing, or has a fever of 103°F or higher, it's best to contact a doctor immediately.

To learn more about "Croup" visit: https://brainly.com/question/29357519

#SPJ11

About how many people live in mexico city A. 9M B. 5M C. 11M

Answers

Answer:

Its A 9M people

Explanation:

Only sworn law enforcement officers must be authenticated by use of a unique user id and password for access to fbi cji data

Answers

Answer: Only sworn law enforcement officers must be authenticated by use of a unique user ID and password for access to FBI CJI data.

✓ TRUE.

Explanation:

Please please help I don’t understand this please

Please please help I dont understand this please

Answers

Answer:

Process the data

Explanation:

Step one process the data

Step two:define the problem

Step three:check for accuracy

Step four:gather data from the user

According to the lecture, the main components of the internet architecture are the ____, ____, and ____ layers, and each of them perform distinct functionalities necessary for online communications.

Answers

A meta-network, or collection of thousands of different networks communicating with a single protocol, is what the internet architecture is. It is known as an internetwork that is connected through protocols, to put it simply. It uses the TCP/IP protocol.

Explain about the internet architecture?

The Internet Architecture Board (IAB) and the Internet Engineering Steering Group are responsible for organizing and managing the Internet Standards process, which is a function of the Internet Society (IESG).

hosts, routers, and networks, which make up the majority of the Internet.

Examples include the File Transfer Protocol for transmitting and receiving files to and from a server, the Ethernet protocol for establishing a connection between computers, and the Transmission Control Protocol/Internet Protocol (TCP/IP) used by networks to connect to the Internet.

Peer-to-peer and client/server network architecture are two of the most popular styles. Because it makes use of numerous tiers, client/server architecture is sometimes known as "tiered." Each of these two types will be covered in further detail in this lecture.

To learn more about internet architecture refer to:

https://brainly.com/question/13429711

#SPJ4

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

consider an http client that wants to retrieve a web document at a given url. the ip address of the http server is initially unknown. what transport and application- layer protocols besides http are needed in this scenario?

Answers

In this scenario, the client will need the Domain Name System (DNS) protocol in addition to the HTTP protocol. The DNS protocol is used to resolve the domain name of the URL to the IP address of the HTTP server.

This is necessary because the client initially does not know the IP address of the server, and therefore cannot establish a connection with the server using the HTTP protocol. The DNS protocol is an application-layer protocol that works over the User Datagram Protocol (UDP) transport layer protocol. Therefore, both the DNS and UDP protocols are needed in this scenario, in addition to the HTTP protocol.

Here is the answer in HTML format:

In this scenario, the client will need the Domain Name System (DNS) protocol in addition to the HTTP protocol. The DNS protocol is used to resolve the domain name of the URL to the IP address of the HTTP server. This is necessary because the client initially does not know the IP address of the server, and therefore cannot establish a connection with the server using the HTTP protocol. The DNS protocol is an application-layer protocol that works over the User Datagram Protocol (UDP) transport layer protocol. Therefore, both the DNS and UDP protocols are needed in this scenario, in addition to the HTTP protocol.

Learn more about the HTTP protocol

https://brainly.com/question/12921030

#SPJ11

14. A film's rated speed is a measure of its ____ to light.​

Answers

A film's rated speed, also known as ISO or ASA, is a measure of its sensitivity to light.

What is a Film's Rated Speed?

The sensitivity of a film to light can be measured by its rated speed, which is also referred to as ISO or ASA. It is a standardized system used to determine how much light is required to produce a usable image on the film.

A higher ISO or ASA rating means the film is more sensitive to light and will require less light to produce a well-exposed image. This can be useful in low-light situations or when using fast shutter speeds.

However, a higher rating can also result in more visible grain or noise in the final image, so photographers must balance their need for sensitivity with the desired quality of the final image.

Learn more about rated speed of films on:

https://brainly.com/question/30454862

#SPJ1

Why do electronic devices gather so much dust? Thanks

Answers

any electrical device that produces any type of air kind of gets collected as the air flows in or out

What is the output for the following program?

for numX in [3,5]
for numY in [1,2]
print (numX, numY)

Answer choices:
A. 3 1
5 1
3 2
5 2

B. 31
51
31
52

C. 31
32
51
52

D. 3 1
3 2
5 1
5 2

Answers

3 2

5 2

Explanation:

A. 3 1 moneyA. 3 1

5 1

3 2

5 2

5 1

3 2

5 2

You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. A different set of observations might result in a larger portion of male drivers being on the phone. Your program compared an equal number of male and female drivers. It is important to test your program with a small enough set of data that you can know what the result should be. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. You could modify the program to allow the user to enter the data.

Answers

Answer:

1,3,4,5 (It's not the one that starts with your program)

Explanation:

Edge 2020

A driver is essentially a piece of software that enables communication between an operating system and a device. Consider the scenario where a device needs to read some data from an application.

What program to compare the portion of drivers?

Type “device management” into the taskbar's search box, then click on Device Manager. To see the names of the devices, choose a category, then right-click (or press and hold) the item you want to update. Decide Automatically check for driver software updates.

A computer software known as a driver, sometimes known as a device driver, that serves as a bridge between the operating system and a device such a disk drive, video card, printer, or keyboard.

Therefore, The device's collection of specific commands must be thoroughly understood by the driver.

Learn more about program here:

https://brainly.com/question/3224396

#SPJ2

Just take points, this website is so weird because of all the reporting and I didn't do any thing

Answers

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

Answer:but this is free ponts so it is safe uggg

Give me atleast 10 common shorcut keys that is often use while working in computer​

Answers

Answer:

1. Ctrl T = opens a new tab

2. Ctrl W = closes a tab

3. Ctrl P = print you screen

4. (for Microsoft users^^) Windows + G = for the Xbox Game Bar

5. Windows + Alt + R = to start recording and to end recording

6. (my personal fav <3) Ctrl + Shift + N = incognito

7. Ctrl Z = undo

8. Ctrl X = cut

9. Ctrl C = copy

10. Ctrl V = paste

Hope This Helps

Barry-

The 10 common shortcut keys that are often used while working on the computer​ are as follows:

Alt + F: File menu options in the current program.Alt + E: Edits options in the current program.F1: Universal help (for any sort of program).Ctrl + A: Selects all text.Ctrl + P: Print the document. Ctrl + X: Cuts the selected item.Ctrl + Del: Cut selected item.Ctrl + C: Copy the selected item.Ctrl + V: Paste the selected item. Alt + Tab: Switch between open apps.

What is the significance of shortcut keys?

The significance of shortcut keys is determined by the fact that they are used to perform a menu function or other common functions in a program or operating system at a very fast and rapid speed. It makes the process easier and faster.

Keyboard shortcuts are generally used to expedite common operations by reducing input sequences to a few keystrokes, hence the term "shortcut". They make the entire process more efficient and productive.

To differentiate from general keyboard input, most keyboard shortcuts require the user to press and hold several keys simultaneously or a sequence of keys one after the other.

Therefore, the 10 common shortcut keys that are often used while working on the computer​ are well mentioned above.

To learn more about Shortcut keys, refer to the link:

https://brainly.com/question/28959274

#SPJ2

which of the following is not a top priority in mobile application development? limiting the use of keyboards saving resources designing for keyboard data entry designing for multitouch designing for a mobile device's camera or other features

Answers

Designing for keyboard data entry is not a top priority in mobile application development.

While keyboard input is still relevant in some scenarios (such as for search fields or form inputs), many modern mobile applications prioritize other input methods such as touch and voice recognition. Limiting the use of keyboards can help to improve the overall user experience and reduce the cognitive load on the user. Saving resources (such as battery and data usage) is also important for ensuring that the application runs smoothly and efficiently. Designing for multitouch is a critical aspect of mobile application development, as it allows users to interact with the application in a more natural and intuitive way. Similarly, designing for a mobile device's camera or other features can enhance the user experience and add value to the application.

To learn more about data entry

https://brainly.com/question/10167355

#SPJ11

Complete Question:
Which of the following is not a top priority in mobile application development?

A. designing for multitouch

B. saving resources

C. designing for multiple screens

D. limiting the use of keyboards

E. designing for keyboard data entry

Select the items below that are examples of things that could use the smart card technology.
O insurance cards
o online dictionaries
O driver's licenses
O payment cards for fuel
O greeting cards
SUBMIT ANSWER
READ NEXT SECTION
ASK FOR HELP

Answers

Insurance cards, driver’s licenses, and pent cards

Answer:

Insurance cards, driver's licenses, payment cards for fuel.

Explanation:

This is what i believe and found evidence to support this as well.

Which of the following will Excel recognize as a date?
Group of answer choices

February 6 1947

2,6,47

2-Feb-47

None of the above

Answers

The option that shows how Excel recognize as a date is February 6 1947.

How does Excel see date?

The Excel  date is often seen as a regular number that is said to have been formatted to often look like a date.

One can you change the cell format to 'General' so that one can see the type of date serial number. Most times, the integer portion of the date serial number stands for the day, and the decimal portion stands for the time.

Read more about Excel from

https://brainly.com/question/25879801

Write a multi-function program that displays the order status for a company that sells spools of copper wire. The program will ask the user for the number of spools ordered, the percentage of the discount the customer receives, whether the customer receives a custom charge for shipping and handling of each spool or the standard charge, when custom charges are specified, the program asks the user for the custom shipping and handling charge per spool, and finally the number of spools in stock. The program will display an order summary on the screen showing: the number of spools back ordered, the number of spools ready to ship. The charges for the spools including any discount, the shipping and handling charges, and the total charges including shipping and handling. The standard charge for each spool is $134. 95. Some customers receive a discount. The standard shipping and handling charge per spool is $15. Some customers get a different charge per spool. Use int variables for storing the number of spools and the number of spools in stock. Use double variables for storing the percentage of the discount, the charges for the spools, the shipping and handling for the spools, and the total charges including shipping and handling. Use a char variable to store the y or n indicator of whether there is a custom shipping and handling charge per spool

Answers

An example of a Python program that satisfies the requirements you specified that is given above is written below.

What is the  multi-function program?

Once a function has existed designed and full, it maybe treated as a 'flight data recorder' that takes few data from the main program and returns a worth.

In this program, we have to define a function calculate_order() that asks the user for recommendation and calculates the order summary established that input. The program uses number variables to store the number of spools ordered and available, a double changing for the discount percent, and another double changeable for the charges and costs.

Learn more about  multi-function program from

https://brainly.com/question/29414690

#SPJ4

Write a multi-function program that displays the order status for a company that sells spools of copper

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

Can someone answer this for me will award brainliest lol

Can someone answer this for me will award brainliest lol

Answers

Answer: Without GUI's being developed, we most likely would still be using terminal systems. Terminals require command/text input rather than mouse or  other input. The invention of GUI's enabled people to use simpler input methods, rather then clunky text input systems. To sum, GUI's simplified the computer experience as we know today.

Hope this helped :)

Jeremiah is writing a program for a gym, where customers need to scan their gym card to get in and out. The program should keep track of how many people are in the gym and refuse entry once the gym is at maximum capacity. Describe one constant and two variables the program should use. (6 marks)

Answers


One constant that the program should use is the maximum capacity of the gym. This constant value should not change during the program's execution, so it should be declared using the final keyword:

final int MAX_CAPACITY = 100;
This declares a constant integer variable named MAX_CAPACITY with a value of 100.

Two variables that the program should use are:

A variable to keep track of the current number of people in the gym. This variable should be initialized to 0 and updated each time someone enters or exits the gym. It can be declared as an int:

int currentOccupancy = 0;

A variable to store the result of scanning a gym card. This variable can be declared as a boolean, with true indicating that the customer is entering the gym and false indicating that the customer is leaving the gym:


boolean scanResult = true;


These two variables will be used to update the currentOccupancy variable accordingly, and to determine whether a new customer can enter the gym based on the current occupancy and the maximum capacity.





ChatGPT Mar 14 Version. Free Research Preview. Our goal is to make AI systems more natural and safe to interact with. Your feedback will help us improve.

Discuss, in your own words, the topic of cybersecurity management for both individuals and business. Briefly talk about the different threats, and then explain what cybersecurity management is, and what it could do against each common type of threat.

Answers

Cybersecurity management protects individuals and businesses from threats.

How does cybersecurity management safeguard individuals and businesses?

Cybersecurity management is essential for both individuals and businesses to protect themselves from the ever-increasing threats in the digital landscape. In today's interconnected world, individuals face various cybersecurity risks, such as malware, phishing attacks, identity theft, and data breaches.

Similarly, businesses are vulnerable to targeted attacks, ransomware, insider threats, and intellectual property theft.

Cybersecurity management involves implementing proactive measures to prevent and mitigate these threats. It includes the use of robust security tools, regular software updates, strong passwords, and user awareness training.

Additionally, businesses should employ network monitoring, intrusion detection systems, and incident response plans to detect and respond to any security breaches promptly.

How cybersecurity management works by adopting a layered defense approach, combining technology, policies, and employee awareness. A comprehensive strategy should include firewalls, antivirus software, encryption, multi-factor authentication, and regular data backups.

It is crucial to continually assess and update security measures to stay ahead of evolving threats and ensure a secure digital environment.

Learn more about Cybersecurity

brainly.com/question/30902483

#SPJ11

In computer science what are the methods used to protect the information stored by a piece of software called?

Answers

In computer science what are the methods used to protect the information stored by a piece of software called option C. information security triad.

What is the Information Security Triad?

The  Information Security Triad is known to be a body that is bond by Confidentiality, Integrity, as well as Availability and they are represented by the three letters "CIA triad."

It is seen as a prominent model that serves as the foundation for the creation of security systems is the CIA triad. They are used to identify weaknesses as well as develop strategies for problem-solving.

Therefore, In computer science what are the methods used to protect the information stored by a piece of software called option C. information security triad.

Learn more about information security from

https://brainly.com/question/13169704
#SPJ1

The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as:

A. information assurance.

B. information defense.

C. information security triad.

D. information integrity.

Answer:

In computer science, the methods used to protect the information stored by a piece of software are called security methods. Security measures are implemented to safeguard sensitive data from unauthorized access, modification, or disclosure. These methods include encryption, authentication, access control, firewalls, and other techniques to ensure the confidentiality, integrity, and availability of the information.

C. Security

Explanation:

In this lab, you will complete the implementation of a medical device vulnerability scoring web page. the purpose of this web page is to return a score that numerically quantifies how vulnerable a specific vulnerability is to the particular attack. the properties of the system will be selected from a group of predetermined options, where each option is a styled radio button. once options are selected for all possible properties, the web page will display the vulnerability score (and hide the warning label).
implement a function called updatescore. this function must verify that one button from each property is selected.
using javascript, add a click or change event listener to each radio button (do not add the event listener to the button label). notice that the radio buttons are hidden using css.

Answers

To complete the implementation of the medical device vulnerability scoring web page, you can follow these steps:-

1. Define the `updateScore` function in JavaScript:
```javascript
function updateScore() {
 // Check that one button from each property is selected
 // Calculate the vulnerability score based on the selected options
 // Display the vulnerability score and hide the warning label
}
```

2. Add a click or change event listener to each radio button using JavaScript:
```javascript
// Select all radio buttons
const radioButtons = document.querySelectorAll('input[type="radio"]');

// Add event listeners to each radio button
radioButtons.forEach((button) => {
 button.addEventListener('change', updateScore);
});
```

Make sure to adapt this code to your specific HTML structure and predetermined options. The `updateScore` function should be modified to handle the selected options and calculate the vulnerability score accordingly.

Learn more about web page here:

https://brainly.com/question/9060926

#SPJ11

Type the correct answer in the box. Spell all words correctly.
Complete the sentence explaining the privileges of being a part of a specific group or organization.
Being a registered member of a
council or organization gives you free access to on-campus facilities.
Reset
Next

Answers

Membership in a council or organization comes with an array of benefits, such as the chance to interact with individuals who share similar interests, privileged admission to exclusive gatherings and assets, and the power to influence the direction and objectives of the collective.

What are the other benefits?

Moreover, numerous establishments provide reduced rates or complimentary admission to amenities located on campus, such as fitness centers, libraries, or workspaces, enabling individuals to utilize these resources without bearing extra expenses.

Becoming a member of a group or organization can furnish individuals with useful networking chances and enable them to gain crucial expertise and exposure that can have advantageous impacts in both their personal and professional domains.

Read more about group members here:

https://brainly.com/question/21277404

#SPJ1

Which of the following is not a function of an operating system?

a. allocates hardware resources
b. controls the flow of input and output
c. carries out a specific task for the user
d. manages storage space​

Answers

Answer:

C:carries out a specific task for the user

Explanation:

Video is a medium that looks real always ,but is real .......

Answers

Answer:

v

Explanation:

what type of data type is 1+78-5​

Answers

Answer:

Integer

Explanation:

Given

\(1 + 78 - 5\)

Required

The datatype

1, 78 and -5 are all numbers and they are without decimal points,

When a number is without decimal, such number is referred to as integer.

Hence, the datatype is integer

Other Questions
Isabella bought school supplies at the store. She chose a notebook for $3.99, 2 pencils that each cost $1.09, and 1 package of markers for $5.25. What is the BEST estimate of the total cost of these items before tax? Leonardo divides a 114 cm long rope into three parts. Two of them are equal and each is 5/9 of the third part. Calculate the measure of each part of the rope. Topic 1 - Separate Legal Entity Doctrine Explain the separate legal entity doctrine in Corporations Law. In your answer, please also ensure that you refer to at least three (3) relevant cases.[1] [1] When referring to cases, please provide the full case citation, an overview of the facts of the case, the legal issue dealt with by the court and the courts final decision. if layla can right 20 essays in 15 minutes and 8 in 6 minutes then how many can she right in 45 minutes? for each example, determine how the market for the good in bolded text will respond to the described change. HELPAnalyze the graphs below and answer the question that follows.Left, a bar graph titled Mexican Pesos per U S Dollar in 2008. The x-axis is labeled July, September, and November. The y-axis is labeled M X N 8 to M X N 14. July and September are over M X N 10. November is over M X N 12. Right, a bar graph titled British Pounds per U S Dollar in 2008. The x-axis is labeled July, September, and November. The y-axis is labeled 0.50 pounds to 0.70 pounds. July is near 0.50 pounds. September is 0.55 pounds. November is 0.65 pounds.Data courtesy of RateXThe graphs above show the exchange rates between the US dollar and two other currencies in 2008. During the months shown, the number of Mexican pesos (MXN) in relation to one dollar rose from 10.2 to 13.1. The number of British pounds () in relation to one dollar also rose from .51 to .65.Based on the graphs, did the value of the US dollar increase or decrease during these months? Please help Im depending on this so I can pass During those long days at sea, many of Magellan's men died of starvation and disease.' What three precautions would you take to avoid such fatal situation If you were one of the sailors? Justify. Belinda has 7 pieces of wood.Each piece of wood measures 3/4 yards.How many yards of wood does she have all together? Point A is located at -0.75 and point B is located at 1/4 on a number line.Point C is the same distance from point B as point A, but it is not the same point. What is the coordinate of point C? Explain your answer. Clades are based on --- and grades are based on ---adaptation; evolutionrelatedness; physcial similarityphysical traits; genesappearance; geography Bella needs to paint a logo made using two right triangles. The dimensions of the logo are shown below. What is the area of the two triangles that need to be painted?Dimensions: Triangle 1: 6 by 2Triangle 2 5 by 9 I am begging you please help me 2. read the sentence. the inscriptions on the wall important dates, and this discovery, in addition to the other artifacts, new light on ancient egypt. which verbs agree with the subjects in the sentence? include, sheds includes, shed includes, sheds What are the 10 principles of risk management? How did the abbasid revolution help islam become a universal religion? place the following events in the correct order. the number of stories in each of the worlds 30 tallest buildings is listed belowa. Why would it be ineffective to display this data as an ungrouped frequency distribution PLEASE HELPPP order from least to greatest. ano ang iyong natuklasan sa natapos na gawain?ipaliwanagfilipino ito Give the equation of a line that is perpendicular to the line y= -4/5x+8