(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.

Answers

Answer 1

Answer:

a) SELECT No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';

b) SELECT branchname, No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe'

GROUP BY branchname;

c) SELECT Name

FROM borrowers B

WHERE cardno NOT IN ( SELECT cardno FROM book_loan)

d) SELECT title, name, B.address

FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)

WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';

e) SELECT title, No_of_copies

FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)

WHERE authorname = 'Stephen King' AND branchname = 'Central';

g) SELECT DISTINCT title

FROM ((book JOIN book_copies) JOIN library_branch)

Explanation:

The SQL statements query's a book store database of seven relations using joins and subqueries to return results.


Related Questions

How can a user change the range of cells that a Conditional Formatting rule applies to?


A: Clear the rule first and reapply it as it cannot be modified.

B: In the Conditional Formatting Rules Manager dialog box, edit the cell range for the rule in the Applies To section.

C: Clear all rules that have been applied to the worksheet or selected range by clicking on the Clear Rules button.

D: Right-click the cell range and select Update Conditional Formatting Rule from the menu list.

Answers

Answer:

B: In the Conditional Formatting Rules Manager dialog box, edit the cell range for the rule in the Applies To section.

Explanation:

Conditional formatting rule: The term "conditional formatting rule" is described as a technique that allows an individual to apply formatting automatically, for example, data bars, colors, and icons, etc., to one or more than one cells on the basis of the cell value.

Example: If the value is more than $3000, color the cell blue.

In the question above, the correct answer is option-B.

Answer:

B

Explanation:

about how many smart devices are active today coinbase

Answers

Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.

What is Smart Device?

Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.

Examples of Smart Devices

Smart devices generally include the following:

SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.

Hence, in this case, it is concluded that the correct answer is 21.5 billion.

Learn more about Smart Device here: https://brainly.com/question/24803254

How to resolve a value is trying to be set on a copy of a slice from a DataFrame?

Answers

To ensure that the original DataFrame gets set, chain the operations into a single operation using loc. The following unchained set operation will always be guaranteed to function by Pandas.

How can I stop someone from trying to set a value on a copy of a DataFrame slice?

On a copy of a slice taken from a DataFrame, a value is being attempted to be set. Making the chained operations into a single loc operation is one method for suppressing SettingWithCopyWarning. This will guarantee that the assignment takes place on the authentic DataFrame rather than a replica.

How can I copy one data frame into another?

Create a replica of the data and indices for this object. When deep=True (the default), a new object with a copy of the data and indices of the caller object will be produced. Changes made to the copy's data or indices won't be reflected in the original object.

to know more about DataFrame here;

brainly.com/question/28190273

#SPJ4

the essential idea behind digital cite zen shop is that ____.

Answers

Answer:

"Digital Citizenship is the status that all online users should own including students. With this citizenship comes freedoms and responsibilities which should be understood in their entirety. Similar to the real world citizens, online users have to follow the rules and try to make use of all its benefits safely"

Explanation:

HELP PLEASE!
I dowloaded this app and it gave me a virus. DOES ANYONE HAVE ANY IDEA HOW TO DELETE IT? I have an apple laptop and I don't know how. My laptop send me a message telling me a have a virus and this laptop has MANY IMPORTANT FILES. PLEASE HELP ASAP. I'LL GIVE BRAINLIEST. DONT GIVE LINKS OR LEAVE IT BLANK.

Answers

Answer:

It probably is fake. Send me a screenshot. Also, just saying if it asks you to download a app of something, dont do it its just a scam to make you panic.

Explanation:

Please answer in C++ programming language
Define a function shift () that receives an array and its size. The function will shift all the elements of the array to the left. The last element will take the value of the first element. (4 marks)

Answers

The solution to the problem is as follows:

#include  using namespace std;

void shift(int arr[], int size)

{

int temp = arr[0];

 for(int i=0;

i> size;

int arr[size];  

for(int i=0;

i> arr[i];

}  

shift(arr, size);

cout << "Array after shifting left:" << endl;

 for(int i=0;

iusing namespace std;

void shift(int arr[], int size)

{

int temp = arr[0];

for(int i=0;

i> size;

int arr[size];

for(int i=0;

i> arr[i];

}

shift(arr, size);

cout << "Array after shifting left:" << endl;

for(int i=0

i

To know more about problem svisit:

https://brainly.com/question/32147976

#SPJ11

Give the an example of the following .
a.)typing software

Answers

Max Type Pro

Stamina Typing Tutor.

Answer:

Microsoft Word

Explanation:

welcome! stay sweet

Rachel is planning on writing code that will have to do computations with very large
numbers. Which of the following is the most important issue she should check
before writing her code?
PLEASE

Answers

Group of answer choices.

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

B. Rachel should reset her machine to store data using hexadecimal values instead of binary.

C. Rachel should run a program to ensure that she has enough memory on her machine to write the program itself.

D. Rachel does not have to worry about the size of the numbers

Answer:

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

Explanation:

In Computer programming, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

1. True or ON, which is equal to one (1).

2. False or OFF, which is equal to zero (0).

Additionally, a binary numbering represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s). Therefore, a binary number refers to any numerical value (number) that is expressed in base-2 numerical system; 0s and 1s.

Also, the total numbers which can be represented with an 8 bit binary (base-2) system is 256.

For all computations that would involve the use of very large numbers, it's important to look up how many bits are used to store integers and floating point numbers.

In this context, Rachel should ensure that she check how many bits the chosen high-level programming language uses to store integers and floating point numbers before writing her codes.

your network contains an active directory domain. the domain contains 10 computers that run windows 10. users in the finance department use these computers. you have a computer named computer1 that runs windows 10. from computer1, you plan to run a script that executes windows powershell commands on the finance department computers. you need to ensure that you can run the powershell commands on the finance department computers from computer1. what should you do first on the finance department computers?

Answers

PowerShell is a cross-platform task automation solution that includes a command-line shell, a scripting language, and a configuration management system.

Explain about the Power shell?

Microsoft created the PowerShell shell framework to help with administrative chores like configuration management and task automation. The programming language that comes with the framework and the shell used to execute commands are both referred to as "PowerShell."

An open-source CLI tool called PowerShell aids in using code to automate IT activities and configurations. PowerShell is a free, open-source command-line interface (CLI) program that enables DevOps experts, IT administrators, and developers to automate processes and setups.

The major purpose of PowerShell is to manage computer systems. Examples of things PowerShell can manage include hardware, software, registry settings, file management, and network configuration. PowerShell can, in essence, control practically every aspect of a computer system.

To learn more about Power shell refer to:

https://brainly.com/question/29221154

#SPJ4

Web sites typically consist of web server software, a hardware server and operating system, a software application, and ______________.

Answers

Web sites typically consist of web server software, a hardware server and operating system, a software application, and content or data. The content or data refers to the information, media, and resources that are displayed and accessed on the website.

This can include text, images, videos, audio files, documents, and any other type of digital content that is presented to the users. The content or data is typically stored in a database or file system and is accessed by the software application running on the web server. The application retrieves the necessary content based on user requests and generates the HTML, CSS, and JavaScript code required to render and display the website to the users' web browsers. The content or data plays a crucial role in creating a compelling and interactive web experience for users. It includes the actual information being presented, such as articles, product details, blog posts, and user-generated content. Without content or data, a website would be empty and devoid of meaningful information for users to consume.

Learn more about software here

https://brainly.com/question/28224061

#SPJ11

In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answer choices

Answers

Answer:

fully replicated

Explanation:

In a distributed database system, the data placement alternative with the highest reliability and availability is fully replicated. Hence, option B is correct.

What is a distributed database system?

A distributed database (DDB) is an organized group of databases that are geographically dispersed among locations in a computer network. A distributed database management system (DDBMS) is a piece of software that controls a distributed database while making the users unaware of the distribution characteristics.

A distributed database is essentially a database that is dispersed across numerous sites, i.e., on various computers or over a network of computers, and is not restricted to a single system. A distributed database system is spread across numerous locations with distinct physical components.

In data warehousing, where enormous volumes of data are processed and accessed by several users or database clients at once, DDBMS is frequently utilized. To manage data in this database system,

Thus, option B is correct.

For more information about distributed database system, click here:

https://brainly.com/question/29896580

#SPJ5

The options were missing-

A. centralized

B. fully replicated

C. strictly partitioned

D. hybrid

Suppose you have a byte-addressable virtual address memory system with eight virtual pages of 64 bytes each, and four page frames. Assuming the following page table, answer the questions below:
Page Frame Valid BIT
0 1 1
1 3 0
2 - 0
3 0 1
4 2 1
5 - 0
6 - 0
7 - 0
How many bits are in a virtual address?

Answers

A byte-addressable virtual address memory system with eight virtual pages of 64 bytes each has a virtual address size of 6 bits.

In the provided memory system, the virtual address consists of two components: the virtual page number and the offset within the page.

Given that there are eight virtual pages, we require three bits to represent the virtual page number (\(2^3\) = 8). This means that three bits are needed to identify a specific virtual page.

Since each page has 64 bytes, we need six bits to represent the offset within each page (\(2^6\) = 64). The offset allows us to address individual bytes within a page.

Therefore, the virtual address in this memory system has a total of nine bits: three bits for the virtual page number and six bits for the offset.

Learn more about virtual address

brainly.com/question/31607332

#SPJ11

help me pls and hurry

help me pls and hurry

Answers

Answer:

Exclude: NOT

Widen: OR

Narrow: AND

What happens when you click a hypertext link?

Answers

At a high level, when you click on a link, your browser and operating system figure out where you’ve clicked. The web page that you’re viewing has hidden information associated with whatever you clicked on. That’s called a Uniform resource locator (URL).

Answer Hypertext is text displayed on a computer or other electronic device with references (hyperlinks) to other text which the reader can immediately access, usually by a mouse click or keypress sequence.

Explanation:

When you click a hypertext link, you are directed to a different page related to the link. This could be a new page on the same website or a page on a different website.

_____ is the process by which attitudes and behaviors are influenced as a result of receiving a message.

Answers

Persuasion is the process by which attitudes and behaviors are influenced as a result of receiving a message.

When individuals are exposed to persuasive messages, they may be persuaded to change their existing attitudes, beliefs, or behaviors. Persuasion involves the use of communication techniques to shape or reinforce opinions and encourage individuals to adopt a particular viewpoint or engage in specific actions.

The process of persuasion typically involves several key elements, including the source of the message (who is delivering it), the content of the message (what is being communicated), the audience (who is receiving the message), and the medium or channel through which the message is conveyed.

Know more about Persuasion here;

https://brainly.com/question/1597628

#SPJ11

What type of conditional statement is represented inthis code? (if, if/else, if/elif,
if/elif/else)
if a > b: print("a is greater than b")

Answers

It is one of the powerful conditional statement. If statement is responsible for modifying the flow of execution of a program. If statement is always used with a condition. The condition is evaluated first before executing any statement inside the body of If.

explain how to select the multiple ranges simultaneously in excel ?​

Answers

Answer:

when selecting a ranges in excel u need to put ur pointer and drag across where u would like to merge ranges

which of the following explains why gives directions to a location for creating an algorithm

A.An algorithm provides step-by-step instructions

B.An algorithm is written in a computer code

C. An algorithm gives different steps each time it is used

D.An algorithm posts directions on a website.​

Answers

I am pretty sure it is D but if not I’m sorry
Iehennsjdjejejrndnndmekrndnxbshje D

Why do politically-powerful groups get bigger positive impacts of externalities?

- 1. GOVERNMENT CORRECTION FAVORS THEM
- 2. MORE POWERFUL GROUPS BECAME POWERFUL BECAUSE OF THESE EXTERNALITIES
- 3. BECAUSE OF CORRUPTION AND BRIBERY
- 4. BECAUSE THE POSITIVE IMPACTS ALWAYS OUTWEIGH THE NEGATIVE TO EVERYONE ELSE

Answers

There are a few reasons why politically-powerful groups get bigger positive impacts of externalities. One reason is that government correction favors them. Another reason is that more powerful groups became powerful because of these externalities.

What is government?
An organised community is governed by a system or group of people, typically a state. Government typically consists of the legislative, executive, and judicial branches in the case of its broad associative definition. Government is a mechanism for making policy decisions as well as a way to enforce organisational policies. A declaration of the government's guiding principles and philosophy is the equivalent of a kind of constitution in many nations. The term "government" is frequently used more specifically to refer to the roughly 200 independent national governments as well as subsidiary organisations, even though all organisations have governance. Modern democracies, monarchies, as well as authoritarian as well as totalitarian regimes are the main varieties of political systems.

Yet another reason is because of corruption and bribery. Finally, because the positive impacts always outweigh the negative to everyone else.

To learn more about government
https://brainly.com/question/1078669
#SPJ1

what kind of script is used to run code on the client

Answers

Answer: JavaScript. What kind of script is used to run code on the client

Canvas allows instructors to utilize powerful edtech apps to create dynamic learning environments for their students. In canvas, apps are identified as.

Answers

In canvas, apps are identified as:

LTIs External Tools

What are Canvas External Tools?

An External Tool is one that helps Canvas users along with the use of LTI learning resources and activities gotten from other websites and academic technologies.

Note that Canvas is known to have a unique features that are said to be available so that one can link to courses such as external tools.

Hence,  In canvas, apps are identified as:

LTIs External Tools

Learn more about Canvas from

https://brainly.com/question/5527678

#SPJ1

what does a terminal access controller access control system plus (tacacs ) keep track of? select all that apply.

Answers

The Terminal Access Controller Access Control System Plus (TACACS+) is a network protocol that provides user authentication, authorization and accounting services. It keeps track of user authentication by verifying the user’s identity and credentials, such as passwords or certificates.

User authenticationUser authorizationNetwork accessAccounting information

TACACS+: Keeping Track of User Authentication, Authorization and Accounting Information

It also keeps track of user authorization, which is the process of granting access to resources based on the user’s identity, privileges and permissions. Additionally, TACACS+ keeps track of network access, allowing users to connect to the network and access resources that are available to them. Finally, it also records accounting information, such as the amount of time a user was connected, the amount of data that was transferred, and the types of activities that were performed. In short, TACACS+ is a comprehensive security protocol that provides robust user authentication, authorization and accounting services.

Since the question is not complete, here's the full task:

What does a terminal access controller access control system plus (tacacs) keep track of?

Select all that apply:

User authenticationUser authorizationNetwork accessAccounting informationSystem configuration

Learn more about Programming: https://brainly.com/question/16397886

#SPJ4

What is a correct MIME type for .docx, .pptx, etc.?

Answers

A correct MIME type for .Docx is application/vnd. openxmlformats-officedocument. wordprocessingml. document.

A document is a representation of ideas that has been written, illustrated, displayed, or preserved, and it frequently includes both fictitious and non-fictional information. The word comes from the Latin Documentum, which means "to teach" or "to provide a lesson"; the verb doce means "to instruct." In the past, the phrase was typically used to refer to written documentation that served as support for a claim or fact. In the age of computers, the term "document" typically refers to a computer file that is mostly text-based and includes the structure, colour scheme, and other formatting elements. Given the availability of electronic documents, the term "document" today is not limited to materials used for transmission, such as paper. As opposed to "document," "documentation" has a wider range of meanings.

Learn more about document here

https://brainly.com/question/28449012

#SPJ4

b) Explain how a lockbox system operates and why a firm might consider implementing such a system.

Answers

A lockbox system is a system in which a company's incoming payments are directed to a post office box, rather than to the company's offices. This allows the company to process payments more efficiently, since the payments are sent directly to a bank that is authorized to receive and deposit them.

The bank will then deposit the funds into the company's account, rather than sending them to the company's offices for processing. First, it can help reduce processing time for incoming payments. Second, a lockbox system can help reduce the risk of fraud.

Since payments are sent directly to the bank, there is less chance that they will be lost, stolen, or misused. Third, a lockbox system can help improve cash flow. By reducing the time, it takes to process payments, the company can receive its funds more quickly and put them to use sooner. This can help improve the company's overall financial position.

To know more about lockbox system visit:

brainly.com/question/33099400

#SPJ11

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Answers

Answer:

Message authentication

Explanation:

hy does payments constitute such a large fraction of the FinTech industry? (b) Many FinTech firms have succeeded by providing financial services with superior user interfaces than the software provided by incumbents. Why has this strategy worked so well? (c) What factors would you consider when determining whether an area of FinTech is likely to tend towards uncompetitive market structures, such as monopoly or oligopoly?

Answers

(a) lengthy and complex processes for making payments (b)  legacy systems and complex interfaces (c) regulatory requirements and substantial initial investment, can limit competition

(a) Payments constitute a significant portion of the FinTech industry due to several factors. First, traditional banking systems often involve lengthy and complex processes for making payments, leading to inefficiencies and higher costs. FinTech firms leverage technology and innovative solutions to streamline payment processes, providing faster, more secure, and convenient payment options to individuals and businesses. Additionally, the rise of e-commerce and digital transactions has increased the demand for digital payment solutions, creating a fertile ground for FinTech companies to cater to this growing market. The ability to offer competitive pricing, improved accessibility, and enhanced user experience has further fueled the growth of FinTech payment solutions.

(b) FinTech firms have succeeded by providing financial services with superior user interfaces compared to incumbents for several reasons. Firstly, traditional financial institutions often have legacy systems and complex interfaces that can be challenging for users to navigate. FinTech companies capitalize on this opportunity by designing user-friendly interfaces that are intuitive, visually appealing, and provide a seamless user experience. By prioritizing simplicity, convenience, and accessibility, FinTech firms attract and retain customers who value efficiency and ease of use. Moreover, FinTech companies leverage technological advancements such as mobile applications and digital platforms, allowing users to access financial services anytime, anywhere, further enhancing the user experience.

(c) Several factors contribute to the likelihood of an area of FinTech tending towards uncompetitive market structures such as monopoly or oligopoly. Firstly, high barriers to entry, including regulatory requirements and substantial initial investment, can limit competition, allowing a few dominant players to establish market control. Additionally, network effects play a significant role, where the value of a FinTech service increases as more users adopt it, creating a competitive advantage for early entrants and making it challenging for new players to gain traction. Moreover, data access and control can also contribute to market concentration, as companies with vast amounts of user data can leverage it to improve their services and create barriers for potential competitors. Lastly, the presence of strong brand recognition and customer loyalty towards established FinTech firms can further solidify their market position, making it difficult for new entrants to gain market share.


To learn more about technology click here: brainly.com/question/9171028

#SPJ11

what are the answers for Quiz 7 answers computer science principles

Answers

Answer:

unknown

Explanation:

this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this

another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence

that and people are more willing to answer one question at a time then a whole quiz lol

not saying what you are doing is bad, its just impractical and not an easy way to go about this

hope you find the answers you need, have a great day/night mate :D

"Cloud suites are stored on your hard drive and are available anywhere you can access the internet.
true/false:

Answers

Cloud suites are stored on your hard drive and are available anywhere you can access the internet, is the true statement.

What is Cloud suites?

Cloud suites are accessible from any location with Internet connectivity and are stored on your hard drive. The most typical components of database management systems include functions, formulas, charts, and what-if analysis. Software for creating presentations with graphics is a great way to influence people and convey a message.

Many apps are designed to function on a specific type of mobile device and cannot be used with other types. An assortment of connected data is called a database.

Thus, it is the true statement.

For more information about Cloud suites, click here:

https://brainly.com/question/5413035

#SPJ1

I’m trying to log into my PS3 and following all the steps but it keeps showing up with this, if I could have some detailed steps of how to log in properly that would be nice, thank you.

Im trying to log into my PS3 and following all the steps but it keeps showing up with this, if I could

Answers

Answer:

From what i can see you just have to use the same user sign-in Id such as email as you did before

Command scripts are just a series of commands saved in a file with a .bat extension.

a. true
b. false

Answers

Command scripts are just a series of commands saved in a file with a .bat extension. This is true

How to explain the information

Command scripts, also known as batch files, are indeed a series of commands saved in a file with a .bat extension. These scripts are commonly used in Windows operating systems to automate tasks by executing a sequence of commands or instructions.

The .bat extension indicates that the file contains a batch script, which can be run by the Windows Command Prompt or by double-clicking on the file.

Learn more about file on

https://brainly.com/question/29511206

#SPJ1

Other Questions
The ratio blue M&Ms to red M&Ms is 12 to 15, how many blue M&Ms would there be in a package that contains 120 red M&Ms?SHOW WORK!!PLEASE HELPPPPPPPPPPPP :) Why is each state's constitution unique? (2 points) Read the sentence.The book Moby Dic is about Captain Ahab, and he searches for a white whale.Which revision corrects the faulty coordination in the sentence?A)The book Moby Dic is about Captain Ahab, who searches for a white whale.B)Searching for a white whale, the book Moby Dic is about Captain Ahab.C) Moby Dic , which is a book about Captain Ahab and searching for a white whale.D) Captain Ahab, who searches for a white whale in Moby Dic, is a book. A tennis ball is dropped off of some stadium bleachers. If the ball was in free fall for 3seconds, how high were the bleachers( how far did the tennis ball fall)? For accelerationdue to gravity on Earth use 10 m/s. Rewrite 11^6 as a product of to powers. The Allen-Bradley SLC 500 one-shot rising (OSR) instruction is an instruction that triggers an event to occur one time. It is given a - address and cannot be used anywhere else in the program.Input, binary (B3) 13. What do UDF and COSATU stand for? What significance do these organizations hold in theapartheid movement? !!!!!!!!!! Helppppppppppppppp Please help me find the values of z and x! Darius is creating a fitness plan to support his goal of wanting to be an Olympic swimmer. He wants to use physiological principles of training to help him create a smart plan to achieve this goal. What are three components of these principles that should be considered when he is making his plan? Describe these components and how each can be applied to his fitness plan. Jim rents an apartment in New York City for $1600 a month. Mike rents his apartment in Boston for 7/8 as much. How much more does it cost Jim than it does Michael for rent? The current yield is defined as the annual interest on a bond divided by which one of the following?Coupon rate.Face value.Market price.Call price.Par value. He was bloody, and disgusting. I think that at that point, that was the start of the zombies. We didnt even know his name, but when we got near the top of the mountain, we could smell the disgusting rotten flesh. We didnt know what it was at first, all we knew was that we were almost to the top of a mountain where we could see the beautiful shining full moon. If it wasnt for that disgusting smell, I remembered thinking, This would be the best moment in my life. When we saw him, it was too late to turn back. We were just too close to him. His guts were hanging out. There was an undead rat hanging from the very tip of his long intestine. It looked like a pink worm was trying to crawl out of his mouth, while he was chewing on it. I could see the heart hanging out by a few strings of gooey ickey flesh and muscle..I would write more but my mom just said I had better not be writing anything morbid. leo le debe 15.00 pesos. Si su madre le da 60.00 pesos de paga y se gasta 20.00 con sus amigos cuanto dinero le queda?tendr pendiente alguna deuda? Make a table of values for each equation. Please hurry this is due tonight. The length of a rectangle is 6 yards more than 8 times the width. The perimeter is 102 yards. Find the length and width.show work/steps!!any links/wrong answers will be reported when ann was traveling outside of the united states, she found the perfect souvenir. unfortunately for ann, when she tried to make the purchase with her debit card, she was told that the transaction was denied. this happened because at that time ann had only $200 in her checking account, even though she had $900 in a savings account at the same bank. the souvenir cost $300. ann was very disappointed and regretted having to pass up the purchase. what could ann have done prior to her trip to ensure that she could spend more than what was in her checking account? at what distance r from the center of a tube of radius r0 does the average velocity occur in a laminar flow? Three is no less than a number x. identify all true statements.Marketing Concepts1. _____Marketing is sales2. _____Tesla is an example of a disruptive brand3. _____Customer Lifetime Value stands for the amount of money a customer spends over their lifetime of purchasing that product or purchasing from that company4. _____Simon Sinek's video on Millennials explains the risks and implications of multi-tasking 5. _____The Home Depot case study was designed to help you better understand reason for being6. _____Home Depot and Target are examples of Establishment Brands7. _____Women's luxury handbag brands cater to want driven purchases8. _____Streaming audio/video/content is an example of a growth category9. _____A brand is a promise fulfilled10. _____Being an Invisible Brand in a Mature or Declining marketing = death