design an sql query to list passengers flying from ord (o'hare airport in chicago) who earned the same or more miles per flight

Answers

Answer 1

The task of the given SQL query is to list passengers who flew from O'Hare airport in Chicago and have earned the same or more miles per flight.

What is the task of the given SQL query?

To design an SQL query to list passengers flying from ORD (O'Hare Airport in Chicago) who earned the same or more miles per flight, we need to join multiple tables. The tables that may be involved include the flights, passengers, and miles tables.

We can start by joining the flights and passengers tables using the flight_id as the common key. Then we can join the miles table to this result set using passenger_id as the common key.

We can then filter the results to only include flights departing from ORD using the `departure_airport` column from the flights table.

Finally, we can group the results by passenger and filter for those who earned the same or more miles per flight using a HAVING clause. The query might look something like this:

SELECT passengers.name, AVG(miles.miles_earned) as avg_miles

FROM flights

This query will return a list of passengers flying from ORD who earned

the same or more miles per flight, along with their average miles earned.

Learn more about SQL query

brainly.com/question/31663284

#SPJ11


Related Questions

Based on the characteristics common to successful entrepreneurs, do you think you would make a good one? Discuss at least one of these traits and explain why it is the trait most developed in you now, and discuss another that would require work to develop?

Answers

Answer:

the answer is 24

Explanation:

With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring

Answers

Answer: Answer Surface

Explanation:

what is an example of an absolute cell reference​

Answers

Answer:

Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.

Explanation:

Topic: Video Games.


What game is the song "Lost in Thoughts all Alone" from? I will give you a hint: It's a JRPG.


Please...No links or gibberish.

Answers

Answer:

Fire Emblem

Explanation:

how to calculate standard deviation for grouped data in excel

Answers

To calculate the standard deviation for grouped data in Excel, you can use the formula `STDEVP` or `STDEV.P`. Here's how you can do it:

1. Arrange your grouped data in Excel, with the values in one column and their corresponding frequencies in another column.

2. In a new cell, use the formula `STDEVP` or `STDEV.P` followed by opening parentheses `(`.

3. Select the range of values in the column that contains your grouped data.

4. Type a comma `,`.

5. Select the range of frequencies in the column corresponding to the values.

6. Close the parentheses `)` and press Enter.

For example, let's assume your values are in column A (A2:A10) and the frequencies are in column B (B2:B10). In cell C1, you can enter the formula `=STDEVP(A2:A10, B2:B10)` or `=STDEV.P(A2:A10, B2:B10)`.

Excel will calculate the standard deviation for the grouped data based on the formula and display the result in the cell.

By using the `STDEVP` or `STDEV.P` function in Excel and providing the ranges of values and frequencies for your grouped data, you can easily calculate the standard deviation. Excel's built-in functions simplify the process and provide accurate results for statistical calculations.

To know more about Excel, visit

https://brainly.com/question/32767960

#SPJ11

Explain the function of cpu what are work done by cu ,alu,and mu

Answers

Answer:

The CPU processes instructions it receives in the process of decoding data.

An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer. Modern CPUs contain very powerful and complex ALUs. In addition to ALUs, modern CPUs contain a control unit (CU). While the memory unit (MU), is the primary memory for holding data. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions.

Hope this helps! :)

in 2015, the nation of burundi had an average bandwidth per internet connection of 11.24 kb/s. in 2016, their average bandwidth was 6.91 kb/s.which statement is true based on those statistics?

Answers

Using the provided statistics, the statement that is true is that the average bandwidth per internet connection in Burundi decreased from 11.24 kb/s in 2015 to 6.91 kb/s in 2016. This means that the average speed at which data is transmitted over the internet in Burundi decreased over the course of a year.

The decrease in average bandwidth per internet connection could be attributed to a number of factors, including a decrease in internet infrastructure investment or the increase in the number of internet users without a corresponding increase in infrastructure. This decrease in bandwidth could have significant impacts on internet users in Burundi, including slower internet speeds, longer download times, and difficulty streaming videos or other multimedia.

For such more question on bandwidth

https://brainly.com/question/12908568

#SPJ11

where can I go to follow other people on brainly? ​

Answers

Answer:

You have to send them a friend request. Click on their profile and that will take you to another link, with their info. Click add friend there.

Hope this helps.

Good Luck

Create a powerpoint presentation (10 slides) and present it to the class and submit it on blackboard about a recent Hacking incident and explain the following in your presentation

Why the Hacking incident occurred.
How the organization dealt with it.
Who was affected by it

Answers

In this presentation, we will discuss a recent hacking incident, focusing on why it occurred, how the organization dealt with it, and who was affected by it.

The hacking incident occurred due to a combination of vulnerabilities in the organization's security systems and sophisticated attack techniques employed by skilled hackers. The attackers may have targeted the organization for various reasons, such as gaining unauthorized access to sensitive information, financial motives, or even to disrupt operations as an act of sabotage.

When the organization became aware of the hacking incident, they swiftly responded by initiating their incident response plan. This involved isolating the affected systems, conducting a thorough investigation to determine the extent of the breach, and identifying the vulnerabilities that were exploited. The organization also engaged cybersecurity experts to assist in the investigation and remediation process.

In terms of dealing with the incident, the organization took several measures. They immediately patched the vulnerabilities that were exploited and enhanced their security measures to prevent future breaches. They also implemented additional layers of authentication, updated their intrusion detection systems, and provided employee training on cybersecurity best practices to mitigate the risk of similar incidents in the future.

The hacking incident had a significant impact on various stakeholders. The organization itself suffered financial losses due to potential data theft, the cost of incident response, and the need for system repairs and upgrades. The customers or users of the organization's services may have had their personal or financial information compromised, leading to potential identity theft or other fraudulent activities. Additionally, the incident may have eroded trust and damaged the organization's reputation, affecting its relationships with clients, partners, and investors.

In conclusion, the hacking incident occurred due to vulnerabilities in the organization's security systems and skilled attackers taking advantage of those weaknesses. The organization responded promptly by implementing their incident response plan, patching vulnerabilities, and enhancing security measures. The incident had significant repercussions for the organization, its customers, and its stakeholders, emphasizing the importance of robust cybersecurity practices in today's digital landscape.

Learn more about organization here:

https://brainly.com/question/32147106

#SPJ11

What's the smallest part of a computer

A microchip

A byte

A bit

A mouse click

Answers

Answer:

A byte

Explanation:

I just had that question on my quiz

A byte!
It can be referring to any sort of byte according to the question. (kilobyte would be pretty small)

Write a program using integers user_num and x as input, and output user_num divided by x three times.

Answers

Code:

user_num = int(input("user_num: "))

x = int(input("x: "))

print(user_num / x ** 3)

Explenation:

First, we make the user give us the values of user_num and x using the input() function. However, to later perform math with them, we first have to convert them into "int" using the int() function. Then we assign a variable to the values. At last we print user_num / x ** 3, since it's the same as dividing user_num by x three times.

You created a plan for the program to find the slope, as shown below.
# Find the slope of the user's two points
# Get the points
# Calculate the slope
# Display the result
This plan is in the form of
O flowcode
O pseudochart
pseudocode
flowchart

Answers

Answer:

Pseudocode

Explanation:

Correct answer edge 2020

Answer:

Pseudocode

Explanation:

When ever you are using idle for coding, if there are number signs(hashtags) in front of the text, that means that this text is considered comments. In the lines of code, these "comments" don't affect the code. They are there as placeholders. The proper term for this is Pseudocode.

Identify the CTSO that is most appropriate for each example. FEA or FCCLA

Fritz wants to prepare for a career as a High School Teacher

Mina wants to become an Elementary School Teacher

Rob wants to prepare to become a strong member of his family

Sara wants to become a leader in her community

Answers

Answer:

Fritz wants to prepare for a career as a High School Teacher :Fea

Mina wants to become an Elementary School Teacher  :FEA

Rob wants to prepare to become a strong member of his family :FCCLA

Sara wants to become a leader in her community :FCCLA

Explain:

Answer:

FEA

FEA

FCCLA

FCCLA

Explanation:

Just did on edge


how do i find the highest daily sales quantity per customer in
June 2014, using a pivot table on excel?

Answers

Using a pivot table in Excel is an effective way to analyze and summarize data. By following the steps outlined above, you can easily find the highest daily sales quantity per customer for a specific period, such as June 2014.

To find the most elevated day to day deals amount per client in June 2014 utilizing a turn table in Succeed, you can follow these means:

Guarantee that your information is coordinated in a plain organization, with every section addressing an alternate variable, (for example, "Client," "Date," and "Deals Amount"). Ensure you have a section for the date in a reasonable date design.

Choose the entire data range, which includes the aforementioned columns. This reach ought to incorporate segment headers and every single pertinent datum.

In Excel, go to the "Insert" tab and select "PivotTable." A window with dialog will open.

Make sure that the "Select a table or range" option is selected in the dialog box and that the appropriate range is shown in the "Table/Range" field. Pick a place for your pivot table, such as a new worksheet or an existing one.

To create the pivot table, select "OK." This will either insert a pivot table at the specified location or open a new worksheet.

In the turn table field list, drag the "Client" field to the "Lines" region and the "Date" field to the "Segments" region.

Drag the "Business Amount" field to the "Values" region. It will, by default, add up all of the sales. To change this, select "Value Field Settings" by clicking the drop-down arrow next to the "Sum of Sales Quantity" field in the pivot table.

Select the "Max" function from the "Value Field Settings" dialog box and click "OK."

A pivot table displaying the highest daily sales quantity for each customer will now be available to you. Locate the sections titled "Row Labels," which ought to display the customers, and "Column Labels," which ought to display the dates. The day's highest sales quantity will be displayed at the intersection of each customer and date.

Click the drop-down arrow next to the "Column Labels" field in the pivot table, uncheck the "Select All" option, and then select "June 2014" from the list of dates to display only June 2014.

To quickly identify the customer(s) with the highest daily sales quantity in June 2014, the pivot table can be sorted by sales quantity in descending order.

To know more about Excel, visit

brainly.com/question/24749457

#SPJ11

Mobile devices have their own OSs, tailored to their handheld needs, which means they are not immune to what?
malware threats
corporate espionage
crowding out legitimate traffic
specific rules

Answers

Answer:

Malware

Explanation:

Malware is used in many types of software included handheld OS's

Select the correct answer.
Ben wants to keep similar items close to each other in the image he is working on. Which is the most effective technique for applying the gestalt
concept of proximity?
The BLANK technique is the most effective technique for applying the gestalt concept of proximity.

Answers

Gestalt Principles are principles/laws of human perception that describe how humans group similar elements, recognize patterns and simplify complex images when we perceive objects.

What are the Gestalt Principles?

The tendency to view items as belonging to the same grouping when they are close to one another is known as the gestalt principle of

proximity

. It claims that regardless of how different the forms and sizes are from one another, if shapes are close to one another, you will perceive them as groups. One of Gestalt's principles, the concept of closeness focuses on how each stimulus would be seen in its most basic form. The

Law of Simplicity

or the Law of Pragnanz are other names for it. It is founded on the idea that the sum of a thing is worth more than the sum of its components.

To learn more about Gestalt Principles refers to;

https://brainly.com/question/4734596

#SPJ1

one way to segment a market is according to whether the purchaser is a consumer or a business-to-business user. t or f

Answers

True, one way to segment a market is according to whether the purchaser is a consumer or a business-to-business (B2B) user.

What is B2B?

This type of market segmentation is based on the end user of the product or service, and it allows companies to tailor their marketing and sales efforts to specific types of customers.

Consumer market segments typically consist of individual consumers who purchase goods or services for personal use, while B2B market segments consist of businesses or organizations that purchase goods or services for use in their operations.

By segmenting the market in this way, companies can create more targeted marketing campaigns and sales strategies, which can help increase their chances of success in the market.

To Know More About B2B, Check Out

https://brainly.com/question/20514029

#SPJ1

Nikita’s home loan is for $200,000 over 30 years. The simple interest on her loan is four percent annually. How much interest will she pay when the loan reaches the maturity date?

Answers

Note that given the above conditions, Nikita will pay a total of $240,000 in interest when her loan reaches maturity.

What is the explanation for the above?

Since Nikita's home loan is for $200,000 at a simple interest rate of 4% annually, the total interest she will pay over 30 years can be calculated as follows:

Total interest = Principal x Rate x Time

where:

Principal = $200,000 (the amount of the loan)

Rate = 4% (the simple interest rate)

Time = 30 years (the loan term)

Total interest = $200,000 x 0.04 x 30 = $240,000

Therefore, Nikita will pay a total of $240,000 in interest when her loan reaches maturity.

Learn more about  maturity date at:

https://brainly.com/question/29606796

#SPJ1

wheneever the srs light is steadily illuminated on the insturment panel, one or more codes related to the fault are likely stored in the computers memory
T/F

Answers

The statement given "wheneever the SRS light is steadily illuminated on the insturment panel, one or more codes related to the fault are likely stored in the computers memory" is true because when the SRS (Supplemental Restraint System) light on the instrument panel is steadily illuminated, it indicates that there is a fault in the system.

This fault is likely to be associated with one or more diagnostic trouble codes (DTCs) that are stored in the computer's memory. These codes help to identify the specific issue or malfunction within the SRS system, such as a problem with the airbags, seatbelt tensioners, or other related components. By retrieving and interpreting these codes using a diagnostic tool, a technician can diagnose and address the underlying problem.

You can learn more about Supplemental Restraint System at

https://brainly.com/question/16499304

#SPJ11

the chief information officer (cio) is negotiating lease prices with several telecommunications providers. she wants a service that offers circuits that will link to various physical buildings and branches, including a connection to the physical demarcation point. for what network infrastructure will this service be used?

Answers

A number of telecom companies, the chief information officer (CIO) is negotiating leasing rates. Several computers are linked via a hub in a local area network (LAN).

What is domain?

Switches, one of the network's traffic controllers, typically operate at Layer.  By utilising packet switching, they enable the connection of several devices within a LAN while reducing the collision domain. To allow private network addresses to be converted to a random external port and public IP address, both network address translation (NAT) and port address translation (PAT) must be enabled. A demilitarised zone (DMZ) is a physical or logical subnet in computer networks that divides a local area network (LAN) from other untrusted networks, typically the public internet.

To learn more about networks from given link

brainly.com/question/15088389

#SPJ4

In a single paragraph, write about the connections between web servers and web pages. Select and differentiate between their various characteristics and how they work together.

Edge please don't copy paste, 20 points

Answers

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

what is a man-in-the-middle attack​

Answers

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

write a function called greater(), that accepts an array of integers, the size of the array and a number n (integer). the function should display all of the numbers in the array that are greater than the number n. write a driver function to test the function greater()

Answers

The greater() function is implemented in Python here, along with a test function:

def greater(arr, size, n):

   for i in range(size):

       if arr[i] > n:

           print(arr[i])

def driver():

   arr = [1,2,3,4,5,6,7,8,9,10]

   size = len(arr)

   n = 5

   greater(arr, size, n)

driver()

In the driver function, we first create an array of integers called arr, and then we use the len() method to calculate the size of the array and store it in the size variable. The variable n, which will serve as the comparison value, is also initialised. The greater() function is then invoked with the array, its size, and n as inputs.

The parameters for the greater() function are an array, size, and n. It then uses a for loop to iterate through the array, checking each element to see if it is greater than n. If so, the element is printed.

Running the driver function will allow you to test the function.

To learn more about Greater Python Function Program Please click on the given link:

https://brainly.com/question/16269836

#SPJ4

what is the difference between a circuit board and a bread board

Answers

Answer:

A bread board is prototyped (manufactured) in a way where it is less permanent than a pcb (printed circuit board) or an even more permanent pcba (printed circuit board assembly). Bread boards are typically the first step to creating a finished circuit because electronic components are easier to test and take apart when needed; design and investigation can be made effectively as no soldering connections are required. Whereas a circuit board is used for the further finished products because they don't have sockets like the bread board and so there is little room for error and mistakes.

What is shoulder browsing? A. accessing someone else’s computer without permission B. deceptively observing people type in personal information C. distributing illegal software D. using internet search engines for information

Answers

B. Deceptively observing people type in personal information.

Essentially, think of it as someone standing behind you, looking over your shoulder, watching everything you do on a computer.

Answer:

b

Explanation:

Complete the code in this program that responds to moving a mouse over a message box.



from tkinter import *

def movingHandler(event):
print("Location: (", event.x, "," , event.y, ")")
return

myWindow = Tk()
message = "Hello."
eventArea = Message(myWindow, text = message)
eventArea.bind('<
>',movingHandler)
eventArea.pack()
eventArea.mainloop()

Button-3
Motion
Button-1
Moving

Answers

Answer:

If it's Question 7 on Edge, the answer is X and Y

Explanation:

Complete the code in this program that responds to moving a mouse over a message box. Segments of code are taken from a larger program. The program's concluding code is Motion, hence option 2 is correct.

How to finish the code?

This question is about Completing the code in this program that responds to moving a mouse over a message box, from this The program's concluding code is Motion.

According to the query, the application reacts when the mouse is placed over a message box.

This indicates that the message box responds to the mouse or other input on it. Button-3, Button-1, and Moving are not correct.

Therefore, this program that responds to moving a mouse over a message box. The code that ends the program is hence option (2) Motion is correct.

Learn more about code, here:

https://brainly.com/question/30129804

#SPJ2

Choose the typecode for the array arr=Array.array 5.3,1.8,2.35])

I
B
F

Answers

Answer: F

Explanation: Press F

The type code for the array arr=Array.array 5.3,1.8,2.35]) is F. The correct option is C.

What is type codes for array?

The symbol used to build the array's type code. The intrinsic representation of one array item's size in bytes. Add a new element with the value x to the array's end.

A single variable that contains a number of identically datatyped pieces, elements, or values is called an array. The typecode character used to build the array is returned by the typecode() method.

In Python, array definitions are made with type codes. To determine an object's type, use the type() function. The syntax of the Python type() function is: object type (name, bases, dict) The type of the object is returned by the type() method when a single argument is supplied to it. It shares the same value as the object.

Therefore, the correct option is c, F

To learn more about type codes, refer to the link:

https://brainly.com/question/27009650

#SPJ2

Given the following list, what is the value of ages[5]?ages = [22, 35, 24, 17, 28]221728None: Index errorFlag this QuestionQuestion 21 ptsGiven the following list, what is the value of names[2]?names = ["Lizzy", "Mike", "Joel", "Anne", "Donald Duck"]MikeJoelAnneNone, improper assignment of "Donald Duck" due to space in the nameFlag this QuestionQuestion 31 ptsGiven the following code, what would the list consist of after the second statement?ages = [22, 35, 24, 17, 28]ages.insert(3, 4)ages = [22, 35, 24, 4, 17, 28]ages = [22, 35, 3, 24, 17, 28]ages = [22, 35, 24, 17, 3, 28]ages = [22, 35, 24, 17, 4, 28]Flag this QuestionQuestion 41 ptsThe __________ method adds an item to the end of a list.pop()append()insert()index()Flag this QuestionQuestion 51 ptsThe primary difference between a tuple and a list is that a tuplehas a limited rangeis indexed starting from 1is mutableis immutableFlag this QuestionQuestion 61 ptsTo refer to an item in a list, you code the list name followed byan index number in brackets, starting with the number 1an index number in parentheses, starting with the number 1an index number in brackets, starting with the number 0an index number in parentheses starting with the number 0Flag this QuestionQuestion 71 ptsWhen a function changes the data in a list, the changed listdoes not need to be returned because lists are mutable.is only available within that function.needs to be returned because lists are immutable.does not need to be returned because lists are immutable.Flag this QuestionQuestion 81 ptsWhich of the following is not true about a list of lists?You can use nested for statements to loop through the items in a list of lists.You can refer to an item in an inner list by using two indexes.To delete an item in the outer list, you first have to delete the list in the item.The inner lists and the outer list are mutable.Flag this QuestionQuestion 91 ptsWhich of the following would create a list named numbersconsisting of 3 floating-point items?numbers[1] = 5.3numbers[2] = 4.8numbers[3] = 6.7numbers = [5.3, 4.8, 6.7]numbers = [0] * 3numbers[3] = (5.3, 4.8, 6.7)Flag this QuestionQuestion 101 ptsWhich of the following creates a tuple of six strings?vehicles = ("sedan","SUV","motorcycle","bicycle","hatchback","truck")vehicles = ["sedan","SUV","motorcycle","bicycle","hatchback","truck"]vehicles = (sedan, SUV, motorcycle, bicycle, hatchback, truck)vehicles = "sedan","SUV","motorcycle","bicycle","hatchback","truck"

Answers

vehicles = ("sedan","SUV","motorcycle","bicycle","hatchback","truck")


1. The value of ages[5] is None: Index error, since the list has only 5 elements and the index starts from 0.

2. The value of names[2] is Joel.

3. After the second statement, the list would be: ages = [22, 35, 24, 4, 17, 28].

4. The append() method adds an item to the end of a list.

5. The primary difference between a tuple and a list is that a tuple is immutable.

6. To refer to an item in a list, you code the list name followed by an index number in brackets, starting with the number 0.

7. When a function changes the data in a list, the changed list does not need to be returned because lists are mutable.

8. The statement "To delete an item in the outer list, you first have to delete the list in the item" is not true about a list of lists.

9. To create a list named numbers consisting of 3 floating-point items: numbers = [5.3, 4.8, 6.7].

10. To create a tuple of six strings: vehicles = ("sedan","SUV","motorcycle","bicycle","hatchback","truck").

Learn more about vehicles here:-

https://brainly.com/question/13390217

#SPJ11

In the decision-making process, after you have chosen the right solution, what is the next step?

Answers

Answer:

Implementing the right solution.

Explanation:

There is little point in taking decisions if it stays in the paper. If the best of the possible alternatives have been identified, it must be properly implemented to accomplish the aim it was chosen for. When a decision has been made, it should be implemented, i.e. enacted, into practice. Because of poor execution, a successful decision may become ineffective. A participatory approach can be an efficient way of enforcing such decisions successfully.

what are the component of cyber law?​

Answers

Answer:

The very important component is "intellectual property".

Explanation:

Cyberlaw seems to be a component of the entire judicial process dealing with either the World wide web, virtual worlds as well as their corresponding legal problems. Intellectual property may also include locations such as technologies, literary criticism, songwriting, as well as industry. Nowadays it provides electronic products that are already offered mostly on the online platform.
Other Questions
Identify various types of entrepreneurs andentrepreneurial ventures.Your original post should be a minimum of 100 words.Cite all sources using APA Style format #8 A boogie board that has a regular price of $70 is on sale at a 35% discount. Find the selling price. in financing their asset growth, finance companies group of answer choices use less equity capital than commercial banks. have relied more on bank loans over time. rely heavily on short-term commercial paper. do not issue demand deposits, but can issue time deposits. use very small amounts of long-term debt and bonds. Match each step of the scientific method on the left with the statement it describes on the right.(Example: 1 & D)Steps of Scientific Method:1. Make an observation2. State the problem3. Identify variables4. Create a hypothesis5. Design an experiment 6. Collect Data7. Draw a conclusionStatements:a. Why arent the plants in my kitchen growing?b. I will use three of the same type of plants. I will give plant A no water for one month. I will give Plant B five ounces of water daily for one month. I will give Plant C two ounces of water daily for one month. All plants will have access to direct sunlight for 6 hours a day.c. When I water my plants with five ounces of water daily, they will grow and maintain large, healthy leaves.d. The plants in my kitchen arent growing.e. Will the amount of PLEASE HELP ME ON QUESTION 10 ASAP!!!!!! GIVING 20 POINTS!!!!!!!!!!!!!!!!!! Drag tiles to match each fraction, decimal, or percent to an equivalent fraction, decimal, or percent. powerful groups that are often the majority, such as heterosexuals in the united states, are known as: calculate the slope of the line. Use points that clearly cross the intersections of the graph paper B) write the equation for the line shown in the graph. Give your answer in slope intercept form Y=mx+b A 5.1 g experimental dart is fired into a blockof wood with a mass of 27.5 g. The woodblock is initially at rest on a 2.4 m tall post.After the collision, the wood block and dartland 2.1 m from the base of the post.Find the initial speed of the dart.Answer in units of m/s.PLSSSS NEED URGENT Write a possible polynomial function in factored form with roots 0, - 5 , and3 what is the price of 1 gb data in India on an average... ? Modify the CountByFives application so that the user enters the value to count by. Start each new line after 10 values have been displayed.public class CountByAnything{// Modify the code belowpublic static void main (String args[]){final int START = 5;final int STOP = 500;final int NUMBER_PER_LINE = 50;for(int i = START; i Which sentence contains the central idea of the paragraph?Referees at sporting events are more likely to suffer hearing loss than their peers. That's because noises louder than 85 decibels can cause permanent hearing damage. Referees' whistles can be as loud as 106 decibels. According to a survey published in the Journal of Occupational and Environmental Hygiene, almost half of the sporting officials surveyed claimed their ears were ringing after a game. This symptom could be caused by damage to their inner ears. josh earned $30,000 last year if the tax rate was 15%,how much money can he keep after taxes An article in Journal of the American Statistical Association (1990, Vol. 85, pp. 972985)measured weight of 30 rats under experiment controls. Suppose that there are 12 underweightrats.a. Calculate a 90% two-sided confidence interval on the true proportion of rats that wouldshow underweight from the experiment. Round your answers to 3 decimal places.b. Using the point estimate of p obtained from the preliminary sample, what sample size isneeded to be 90% confident that the error in estimating the true value of p is no morethan 0.02?c. How large must the sample be if we wish to be at least 90% confident that the error inestimating p is less than 0.02, regardless of the true value of p? Describe the experimental evidence used to identify dna as the genetic material, and to determine its structure. When you encounter a yellow arrow signal while turning left at an intersection, you must:-reduce your speed-stop at the signal-clear the intersection quickly-increase your speed excoriation disorder is typically confined to what area? The most likely reason for the differences in the two maps is the A)collapse of the Soviet UnionB)expanded military power of the old Soviet UnionC)gradual lessening of ethnic loyalties in the former Soviet UnionD)successful attempts by the former Soviet Union to crush nationalistic sentiments What determines the traits of offspring?A.Food sources that have been genetically engineered B.Literary metaphors and exciting connotations C.The pool of entries in the state lotto jackpot D.Genes received from the offspring's parents