Answer:
B. Which customer most frequently purchases bread.
Explanation:
As per the scenario, the data we are receiving from the sales record of the bakery is :
The date on which the items are sold
Each items name which are sold
The number of each item sold and
The price of each item sold
These data are required to estimate how much the company has earned the profit during a given period of time.
So from the above scenario, there is no data given about the customer i.e customer name, customer number, etc. So there is no chance to track the details of a customer purchase history.
Therefore, the most appropriate answer is option B
Answer:
The correct answer is BC → A, A does not hold over S. we noticed the tuples (1 ,2 ,3 ) and (4 ,2 ,3) which can hold over S)
Explanation:
Solution
No, since in this case the instance of S is provided. so such particular dependencies are unable to breach through such instance, but unable to tell which the dependencies hold towards S.
A functional dependency holds towards only when a relation forms a statement regarding the complete allowed instances of relation.
Using the knowledge of pseudocodes it will be possible to write a code that calculates the amount of hours worked and giving warnings about it.
<h3>Writing a pseudocode we have that:</h3>
<em>while </em>
<em>if number == 0</em>
<em>break</em>
<em>hours =0 </em>
<em>for i =1 to 5 </em>
<em>hours = hours + time_out[ i ] - time_in[ i ]</em>
<em> If hours >36 : </em>
<em>print ( "Name is " ,name)</em>
<em>print( "No of hours are ",hours)</em>
<em>print("Congratulaion! Your working hours are more than 36")</em>
<em>If hours <30 : #</em>
<em>print ( "Name is " ,name)</em>
<em>print( "No of hours are ",hours)</em>
<em>print("Warning !!!")</em>
<em>End loop</em>
See more about pseudocode at brainly.com/question/13208346
#SPJ1
Answer:
import java.util.Scanner;
public class TestClock {
public static void main(String[] args) {
Scanner in = new Scanner (System.in);
System.out.print("Enter favorite color:");
String word1 = in.next();
System.out.print("Enter pet's name:");
String word2 = in.next();
System.out.print("Enter a number:");
int num = in.nextInt();
System.out.println("you entered: "+word1+" "+word2+" "+num);
}
}
Explanation:
Using Java Programming language
- Import the Scanner class
- create an object of the scanner class
- Prompt user to enter the values for the variables (word1, word2, num)
- Use String concatenation in System.out.println to display the output as required by the question.
Answer:
The answer is "DDoS
"
Explanation:
The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.
- This attack is aimed to avoid legal customers of one's website from accessing it.
- In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.
- One other way to successfully attack is to send fake requests from the attacker.