SQL requires that you follow special formatting rules.​ T/F

Answers

Answer 1

True. SQL (Structured Query Language) requires following special formatting rules.

SQL is a language used to communicate with databases and to retrieve, insert, update, and delete data from them. To interact with databases using SQL, users must write SQL statements, which are composed of keywords, expressions, and other elements that must follow specific formatting rules. For example, SQL keywords are not case sensitive, but are typically written in uppercase letters for readability. SQL statements must also use specific syntax for elements such as SELECT, FROM, WHERE, and ORDER BY clauses, and must use appropriate punctuation such as commas, parentheses, and quotation marks. Incorrect formatting of SQL statements can lead to syntax errors and unexpected results.

To learn more about Structured click on the link below:

brainly.com/question/31259663

#SPJ11


Related Questions

Where is the Appearance and Personalization option found?
A.in the troubleshooting section
B.in the performance monitor section
C.in the safe mode section
D. in the remote desktop section

Answers

Answer:

A.in the troubleshooting section

Explanation:

Appearance and personalization is a category or set of tools which is found in the control panel in the start menu of windows.

Appearance and personalization allow the user to use various tools like customization of windows, change the theme, screen savers, file explorer options, navigation buttons, ease of access centre, change fonts etc.

The appearance and personalization category is present as the sixth panel of the control panel. The troubleshooting section allows the user to open the control panel from which appearance and personalization category can be opened.

Thus, Option-A is the correct answer.

Type the correct answer in the box. Spell all words correctly.
Since the Internet, information has become easy to access quickly. This has lead to difficulty verifying this information and requires you to have
what attitude toward it?
A healthy(blank)
is required when attempting to verify information on the Internet.

Answers

Answer: search

Explanation:

Answer:

A healthy Skepticism is required when attempting to verify information on the Internet.

Explanation:

which of the following are included in r packages? select all that apply. O tests for checking your code O naming conventions for r variable names O sample datasets
O reusable r functions

Answers

The option that are included in R- packages are options:

A Tests for checking your code

C Sample datasets

D Reusable R functions

What purposes serve R packages?

Extensions to the R statistical programming language are known as packages. Users of R can install R packages, which are standardized collections of code, data, and documentation, typically through a centralized software repository like CRAN (the Comprehensive R Archive Network).

Therefore, in regards to the case above, one can say that Reusable R functions, sample datasets, and tests to validate your code are all included in R packages. The instructions for using the included functions are also included in R packages.

Learn more about R- packages from

https://brainly.com/question/29414342
#SPJ1

mit- final exam which business application provide a service in and is designed to give mobile users instant access to personalized local content

Answers

Web Services can be used to retrieve and integrate business data from heterogeneous business systems.

What is meant by business application?

Business apps are a software application or a collection of programs that provide business functionality. They are also used to increase and monitor productivity across the board for the business. Business apps can be used alone, in conjunction with some other business software, or externally.

Why is application for business important?

Every business aspires to increase sales, revenue, brand awareness, and customer base. A mobile application makes it feasible for businesses to do all of these tasks as well as find a ton of opportunities for growth and huge revenue.

To know more about business application visit:

https://brainly.com/question/17956671

#SPJ4

Write a program that reads a string from the user containing a date in the format mm/dd/yyyy. It should print the date in the format April 25, 2020. You may assume the date entered is valid and that there is always exactly 2 digits for month and day.

Answers

The program illustrates the use of list slicing

The program in Python where comments are used to explain each line is as follows:

#This initializes all months

monthList = ["January","February","March","April","May","June","July","August","September","October","November","December"]

#This gets input for date

ddate = input("Date: ")

#This extracts the month from the input date

month = monthList[int(ddate[0:2]) - 1]

#This prints the date in the required format

print(month+" "+ddate[3:5]+", "+ddate[6:10])

Read more about list slicing at:

https://brainly.com/question/16397886

HELP PLS!! Complete the following sentence.
It is very common for job seekers in high-tech/ ____
technology fields to acquire certifications to assure agencies of their
qualifications

Answers

What the guy above me is true it’s high tech because it’s explaining what it is also.

which of the following are benefits of the domain name system (dns)? select all that apply. 1 point it provides addresses that are easier for people to remember. it helps automate network configuration. it assigns internet protocol (ip) addresses. it provides network address translation (nat).

Answers

The correct answers are:

It provides addresses that are easier for people to remember.It helps automate network configuration.

The benefits of the Domain Name System (DNS) include:

It provides addresses that are easier for people to remember: DNS enables the mapping of domain names (e.g., www.stat.com) to their corresponding IP addresses. This allows users to access websites or services using human-readable domain names instead of having to remember complex IP addresses.It helps automate network configuration: DNS simplifies network configuration by automatically resolving domain names to IP addresses. Instead of manually configuring IP addresses for each device or service, DNS enables automated lookup and resolution of domain names, making network administration more efficient.It assigns Internet Protocol (IP) addresses: DNS does not directly assign IP addresses, but it plays a critical role in the resolution of domain names to their associated IP addresses. DNS servers store and distribute IP address information, facilitating the proper routing and delivery of network traffic.

To know more about Domain Name System (DNS)

brainly.com/question/32768737

#SPJ11

Protection against active attacks (falsification of data and transactions) is known as?

Answers

Answer:

Message authentication.

Explanation:

Fill in the blank
please help.

_______________________ _____________________ software allows you to prepare documents such as _______________________ and _______________________. It allows you to _______________________, _______________________ and format these documents. You can also _______________________ the documents and retrieved it at a later date.

Answers

Answer:

Application software allows you to prepare documents such as text and graphics. It allows you to manipulate data , manage information and format these documents. You can also store the documents and retrieve it at a later date.

How do you turn your story/script into a rigorous and relevant video project?

Answers

You turn your story into a rigorous and relevant video project by finding a interesting topic, after that you find solid sources to support the topic you picked.

a data visualization tool that updates in real time and gives multiple outputs is called

Answers

Answer:

A data dashboard

Explanation:

A data visualization tool that updates in real time and gives multiple outputs is called data dashboard.

Why is data dashboard required?

A data dashboard is a tool that many businesses use to monitor, examine, and present data—typically to acquire understanding of the general health of an organisation, division, or particular procedure.

Businesses utilise an interactive analytical tool called a data dashboard to analyse and monitor the effectiveness of their plans using high-quality KPIs.

These tools give businesses access to real-time data so they can extract useful insights and guarantee ongoing growth.

Making it simpler for data analysts, decision-makers, and everyday users to understand their data, acquire deeper insights, and make better data-driven decisions is the main goal of a data analytics dashboard.

Data dashboard is a term used to describe a real-time updating, multi-output data display tool.

For more details regarding a data dashboard, visit:

https://brainly.com/question/29854747

#SPJ6

Roland knew that the code to his sister toy safe was only two digits ong he was able to crack the safe open by attempting every two digit code until he found the correct one what method code breaking did Roland use

Answers

Answer:

Brute-force attack

Explanation:

a brute force attack is when you use a bunch of random passwords in the hopes of eventually getting it right

Answer:

Permutation cipher

This is a complete enumeration of all possible keys of small length (we have a length of 2).

The first digit is 1, 2, 3, ..., 8, 9.

Second digit 0, 1, 2,…, 8, 9

Number of options: 9*10 = 90

10, 11, 12, … 97, 98, 99

A website for a certain political party or candidate is likely to have unbiased
information. Choose the answer.

True

False

Answers

False I believe probably false

Answer:the answer is false i had the same question in my test and i put false i got it right

Explanation:

how to use function in python

Answers

Answer:

Use the keyword def to declare the function and follow this up with the function name.

Add parameters to the function: they should be within the parentheses of the function. ...

Add statements that the functions should execute.

Which of the following will Excel recognize as a date?
Group of answer choices

February 6 1947

2,6,47

2-Feb-47

None of the above

Answers

The option that shows how Excel recognize as a date is February 6 1947.

How does Excel see date?

The Excel  date is often seen as a regular number that is said to have been formatted to often look like a date.

One can you change the cell format to 'General' so that one can see the type of date serial number. Most times, the integer portion of the date serial number stands for the day, and the decimal portion stands for the time.

Read more about Excel from

https://brainly.com/question/25879801

you can send and receive documents on your computer that were originally written on paper. you received many of these messages via the internet. which type of server has traditionally been used to translate these messages from paper to computer?

Answers

The server which has traditionally been used to translate messages from paper to computer is OCR server (Optical Character Recognition server).

In today's world, where technology is rapidly evolving, computers have become a fundamental aspect of people's daily lives. It is widely used in various fields such as communication, education, entertainment, medical care, and others, it is even used to convert paper-based documents into digital documents. With this, the concept of optical character recognition has also emerged, which has simplified the task of converting paper-based documents into digital documents.Optical Character Recognition, also known as OCR, is a process that converts images of typewritten or handwritten text into machine-readable text. The software analyzes the image and extracts the letters, numbers, and characters to convert it into a text file.

Learn more about OCR server: https://brainly.com/question/27960093

#SPJ11

What would be the data type of "Number"+str(14)?

A string
An integer
It would produce an error

Answers

Answer:

string but see below.

Explanation:

Depending on the language, it would produce a string in most languages I know. More precisely it would convert an integer into a string that would be attached to the string "number". If it works for you, I would put a space between the r in number and the " mark. But you may want it to read as "Number14.

Which statement best explains the purpose of using online note-taking tools?

Online note-taking tools guarantee better scores on tests.
Online note-taking tools let students take notes quickly and easily.
Online note-taking tools tell students exactly what they need to study.
Online note-taking tools turn disorganized notes into organized notes.

Answers

Answer:

B

i did the instruction

Explanation:

The statement which best explains the purpose of using online note-taking tools is that Online note-taking tools let students take notes quickly and easily. Thus, the correct option for this question is B.

What is an online note-taking tool?

An online note-taking tool may be characterized as a type of software tool that significantly allows users to capture, store, and manage voice and text notes on different devices.

It makes note-taking convenient and accessible and allows you to write and study flexibly. Unlike other note-taking apps, you can view documents and take notes at the same time on one screen.

The primary purpose of note-taking is to encourage active learning and to prepare study materials for exams. Developing note-taking skills should help you organize information into an understandable format that will assist in your studying process.

Therefore, the correct option for this question is B.

To learn more about Note-taking tools, refer to the link:

https://brainly.com/question/18546670

#SPJ2

random access memory is ___________. permanent persistent continual volatile

Answers

Random access memory is volatile .(Option D)

How is this so?

Random Access Memory (RAM) is a type of computer memorythat is volatile, which means it is   not permanent or persistent.

It is a temporary storage location used by the computer to hold data and instructions that are actively beingaccessed by the processor.

RAM allows for quick and   random access to data, but its contents are lost when the computer is powered off or restarted.

hence, it is correct to state that the RAM is volatile. (Option C)

Learn more about Random access memory  at:

https://brainly.com/question/28483224

#SPJ4

Full Question:

Although part of your question is missing, you might be referring to this full question:

Random access memory is _____.

a. volatile

b. permanent

c. persistent

d. continual

explain the all types of commands. off DDl and DML​

Answers

Here is your Answer:-

DDL Commands:- DDL means Data Definition Language. It is used to create and modify the structure of database objects in SQL.

DML Command:- DML Command in SQL database stands for Data Manipulation Language. DML commands are used to retrieve, store, Modify, delete, insert and update data in database.

Answer:

Structured Query Language(SQL) as we all know is the database language by the use of which we can perform certain operations on the existing database and also we can use this language to create a database. SQL uses certain commands like Create, Drop, Insert, etc. to carry out the required tasks.

These SQL commands are mainly categorized into four categories as:

DDL – Data Definition Language

DDL – Data Definition LanguageDQl – Data Query Language

DDL – Data Definition LanguageDQl – Data Query LanguageDML – Data Manipulation Language

DDL – Data Definition LanguageDQl – Data Query LanguageDML – Data Manipulation LanguageDCL – Data Control Language

Though many resources claim there to be another category of SQL clauses TCL – Transaction Control Language. So we will see in detail about TCL as well.

DDL (Data Definition Language):

DDL or Data Definition Language actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the database schema and is used to create and modify the structure of database objects in the database.DDL is a set of SQL commands used to create, modify, and delete database structures but not data. These commands are normally not used by a general user, who should be accessing the database via an application.

List of DDL commands:

CREATE: This command is used to create the database or its objects (like table, index, function, views, store procedure, and triggers).

DROP: This command is used to delete objects from the database.

ALTER: This is used to alter the structure of the database.

TRUNCATE: This is used to remove all records from a table, including all spaces allocated for the records are removed.

COMMENT: This is used to add comments to the data dictionary.

RENAME: This is used to rename an object existing in the database.

DQL (Data Query Language):

DQL statements are used for performing queries on the data within schema objects. The purpose of the DQL Command is to get some schema relation based on the query passed to it. We can define DQL as follows it is a component of SQL statement that allows getting data from the database and imposing order upon it. It includes the SELECT statement. This command allows getting the data out of the database to perform operations with it. When a SELECT is fired against a table or tables the result is compiled into a further temporary table, which is displayed or perhaps received by the program i.e. a front-end.

List of DQL:

SELECT: It is used to retrieve data from the database.

DML(Data Manipulation Language):

The SQL commands that deals with the manipulation of data present in the database belong to DML or Data Manipulation Language and this includes most of the SQL statements. It is the component of the SQL statement that controls access to data and to the database. Basically, DCL statements are grouped with DML statements.

List of DML commands:

INSERT : It is used to insert data into a table.

UPDATE: It is used to update existing data within a table.

DELETE : It is used to delete records from a database table.

LOCK: Table control concurrency.

CALL: Call a PL/SQL or JAVA subprogram.

EXPLAIN PLAN: It describes the access path to data.

DCL (Data Control Language):

DCL includes commands such as GRANT and REVOKE which mainly deal with the rights, permissions, and other controls of the database system.

List of DCL commands:

GRANT: This command gives users access privileges to the database.

REVOKE: This command withdraws the user’s access privileges given by using the GRANT command.

Though many resources claim there to be another category of SQL clauses TCL – Transaction Control Language. So we will see in detail about TCL as well. TCL commands deal with the transaction within the database.

List of TCL commands:

COMMIT: Commits a Transaction.

ROLLBACK: Rollbacks a transaction in case of any error occurs.

SAVEPOINT:Sets a savepoint within a transaction.

SET TRANSACTION: Specify characteristics for the transaction.

need help on question 5! no links pls

need help on question 5! no links pls

Answers

Answer: less than 50%, it’s about 49%

Explanation:

Answer:

59.5

so I would say the 3 third option

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

Select the correct answers.
Which are the benefits of leveraging web technologies?
processing of large amounts of data
more manpower
better marketing and customer service
increased production costs
difficulty in handling customer complaints

Select the correct answers.Which are the benefits of leveraging web technologies?processing of large

Answers

Answer:

Explanation:

Select the correct answers.

Which are the benefits of leveraging web technologies?

1) Processing of large amounts of data

2) Better marketing and customer service

mike is an ethical hacker hired as a consultant to test the security of a mid-sized company's network. as part of his assignment, he has been given physical access to the system. he has built a dictionary of hashed passwords from the hard drive of the device. which type of attack is he planning to launch? group of answer choices rainbow brute force dictionary hybrid

Answers

Based on the information given, Mike is planning to launch a dictionary attack using the dictionary of hashed passwords he built from the hard drive of the device. Therefore, the type of attack he is planning to launch is a dictionary attack.

A Dictionary Attack is an attack vector used by the attacker to break in a system, which is password protected, by putting technically every word in a dictionary as a form of password for that system. This attack vector is a form of Brute Force Attack.

The dictionary can contain words from an English dictionary and also some leaked list of commonly used passwords and when combined with common character replacing with numbers, can sometimes be very effective and fast.

Basically, it is trying every single word that is already prepared. It is done using automated tools that try all the possible words in the dictionary.

learn more about dictionary attack here:

https://brainly.com/question/29299283

#SPJ11

tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. she copies the files she has been working on (which contain phi) to a flash drive and drops the flash drive in her purse for later use. when tamara gets home, the flash drive is missing. is this a security breach?

Answers

On the way home from work, Tamara who works as an analyst decides she needs to do some advanced work at home tonight. The files that he had copied and worked on at the office were stored on the flash drive, but when he got home the flash drive was gone. The incident that Tamara experienced was not a security breach.

What is security breach?

A security breach is any incident or occurrence that results in unauthorized access to data on a computer, on an application, on a network, or on a device. This will result in information being accessed without involving authorization. This leads to unauthorized access to information.

Learn more about serious security breach occurred in your organization here https://brainly.com/question/23077661

#SPJ4

Which of the following data collection methods is generally the least flexible?

Answers

The data collection method that is generally considered the least flexible is the questionnaire survey.

Questionnaire surveys involve the distribution of pre-designed questionnaires to gather data from respondents. This method tends to be less flexible compared to other data collection methods. The structure and format of the questionnaire are predetermined, providing limited room for customization or adaptation during data collection. The questions are typically closed-ended with predefined response options, which restricts the flexibility to capture nuanced or unexpected information. Additionally, questionnaire surveys often lack the opportunity for real-time clarification or follow-up, further limiting flexibility in data collection compared to methods such as interviews or focus groups.

know more about Questionnaire surveys :brainly.com/question/15021447

#SPJ11

Es la actividad que posibilita comunicar gráficamente ideas, hechos y valores procesados y sintetizados en términos de forma y comunicación, factores sociales, culturales, económicos, estéticos y tecnológicos

Answers

Answer:

La estadística es una rama de las matemáticas aplicadas que se ocupa de la recopilación, evaluación, análisis y presentación de datos o información. El trabajo también utiliza elementos de cognición, psicología, informática y ciencias de sistemas, cálculos numéricos y contribuciones de otras materias que tratan de matemáticas, datos y métodos informáticos intensivos.

El resultado, también llamado estadística, a menudo se presenta en forma numérica en números absolutos, números de frecuencia, números proporcionales, promedios, en tablas con series de tiempo o con otros números comparativos y a menudo también se ilustra en diagramas o figuras. El resultado se usa en parte para mostrar cómo se maneja algo en este momento y en parte como una herramienta para predecir eventos futuros mediante inducción. La estadística se utiliza en muchas disciplinas científicas, desde las ciencias naturales hasta las humanidades, pero también en la política y los negocios.

the characteristics of relevant information include predictive value, feedback value and timeliness. group startstrue or falsetrue, unselectedfalse, unselected

Answers

True. The characteristics of relevant information include predictive value, feedback value, and timeliness.

Relevant information is information that is useful for making informed decisions. The characteristics of relevant information are as follows:

Predictive value: Predictive value means that the information can help predict future outcomes. For example, financial information that helps predict future earnings is considered to have predictive value.Feedback value: Feedback value means the information can be used to evaluate past decisions. For example, financial information that helps evaluate the effectiveness of past investments is considered to have feedback value.Timeliness: Timeliness means that the information is available when needed to make informed decisions. Information that is received too late may not be useful for decision-making.

Together, these characteristics help ensure that the information used in decision-making is relevant, accurate, and useful.

Learn more about decision-making and accounting here:https://brainly.com/question/28423498

#SPJ4

Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.
1. Click the
button.
2. In the Contact window, enter information for the contact.
3. Click the
button

Answers

Answer:

1 new contact 2 save and close

Answer: New contact & Save & Close.

Explanation:

Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.1.



please help it's my last question



Mention different between client / server architecture and peer to peer architecture of the network.​

Answers

Explanation:

In Client-Server Network, Clients and server are differentiated, Specific server and clients are present. In Peer-to-Peer Network, Clients and server are not differentiated. ... In Client-Server Network, Centralized server is used to store the data. While in Peer-to-Peer Network, Each peer has its own data

Answer:

thanks for the point of contact

Other Questions
You are planning your week-end schedule. You can spend at most 8 hours playing video games and doing homework. You want to spend less than 2 hours plavideo games. You must spend at least 1.5hours on homework. Which of the following is the system of equations that would represent this situation? Let v-number of hours spent playing video games and let h- the number of hours spent on homework. What are 2 ways humans can affect coral reefs? i will make you brainliest which of the following is skha waya 1. depart host2. single path3. hand rug Find the slope between (-1, 7) and (-3, 1). A 235 kg crate is pulled across a horizontal surface with a force of 760 N applied at anangle of 30 above the horizontal. Determine the horizontal component of the appliedforce The Necessity of Hybrids".What do you get if you cross two different species? Depending upon the species, you might end up with a grolar bear, a wolfdog, or a Savannah cat, among many others. What do these animals have in common? They're hybrids. Sometimes hybrids happen naturally in the wild, but usually, hybrids are the result of humans selectively breeding animals.Grolar bears and pizzlies are the result of crossing polar bears and grizzly bears. These hybrids were first seen in zoos, as the bears' natural habitats did not normally overlap. Recently, these hybrids have started appearing in the wild. Due to climate change, the bears' once-separate habitats are beginning to overlap. Bigger and more aggressive than their parents, grolar bears and pizzlies could pose a risk to natural habitats and humans.Wolfdogs are, as their name suggests, the result of crossing a wolf with a domestic dog. Bred for the pet trade, these hybrids do not often happen in the wild. Wolfdogs do not make good pets, however, as they can be destructive and aggressive. Many states have outlawed keeping wolfdogs because they can pose a danger to people.Savannah cats are another example of human-made hybrids that were developed to be pets. Savannahs are the result of crossing a small wildcat called a serval with a domestic housecat. They look like miniature versions of the wildcat, which is why many people like keeping them as pets. Like the wolfdog, however, Savannahs do not make ideal house pets. They can be destructive, and usually, they keep the wild nature of the serval.There are many more examples of human-made hybrid animals. Some hybrids, such as the mule, have been helpful to humans. Unfortunately, others, like the wolfdog or Savannah cat, should not have been made in the first place.According to the text, why are bear hybrids being seen in the wild?Due to climate change, the bears' once-separate habitats are beginning to overlap.Grolar bears and pizzlies are the result of crossing polar bears and grizzly bears.Grolar bears and pizzlies could pose a risk to natural habitats and humans.These hybrids were first seen in zoos, as the bears' natural habitats did not normally overlap. Two countries were pioneers in protecting the Amazon. They established national parks and protected reserves in this region and today 50% of the Amazon is protected. Which two countries led the way in protecting this region assume it takes 10 units of labor to produce 4 units of output. when the price of labor is $6 per unit (of labor) and fixed costs equal $65, what is the total cost of those 4 units of output? (assume labor cost is the only variable cost) In their relationship, Kim and Robert eat their meals together, present themselves to others as a unified couple, and seldom ever have gender-role conflicts in their relationship. They exemplify 1. Decribe the similarities and differences between the endocryme and nervous regulation?2. The pancreas and the gonads are glands with double secreation. Explain why. 3. Patiens suffering from the disease diabetes mellitus have increased level of blood sugar. Why hormone is insufficent and what it the functions of this hormone? favourable conditions for harnessing SOLAR ENERGY PART II. MULTIPLE CHOISE. ( 18 marks)Direction: Read the questions carefully and choose the correct option.( 2 marks each)1. On January 2, Apple Company purchases factory machine at a cash price of $60,000. Relatedexpenditures are sales taxes $2,000, Insurance after the installation is $200, Installation and testing $1,000, Salvage value is $1,000. Useful life of the machine is 5 years.a. Compute the cost component of the machine.a.$63,200b.$60,000c.$63,000 Consider an economy described by the combined solow and romer model. if this economy is on its balanced growth path when an exogenous permanent increase in the depreciation rate occurs:________ Figure ABCD is a rhombus. Rhombus A B C D is shown. Angle A is (5 x 25) degrees and angle D is (7 x minus 1) degrees. What is the value of x ron and gail plan to lower fun-spot's prices in an effort to encourage customers to stay longer, visit more often, and spend more money during each visit. what type of strategy are ron and gail planning? Plot A shows the number of hours ten girls watched television over a one-week period. Plot B shows the number of hoursten boys watched television over the same period of time.Television Viewing Hours for a One-Week PeriodPlot A000 0 0 0 00 123456789 10Plot BOOO01234578910Which statement compares the shape of the dot plots? What do you put on top of a tripod when you are using crystalisation? 16. Complete the steps for factoring linear expressions. 17. Rewrite 18x + 12 by factoring out the GCF. Where can you go shopping?A.la tienda de descuentosB.la libreraC.la escuela Find the sum. 50,000 6,000 910 3,408 25+_____