What field(s) should be foreign key(s) in the Rentals table?

CID

Make

Rtn

Both A and B

Answers

Answer 1

The foreign keys in the Rentals table should be CID (customer ID) and Make. Both A and B.

The field(s) that should be foreign key(s) are CID (Customer ID) and Make.

Let's discuss why each of these fields would serve as a foreign key.

CID (Customer ID):

The CID field in the Rentals table should be a foreign key referencing the primary key in the Customers table.

This establishes a relationship between the Rentals and Customers tables.

By using CID as a foreign key can link each rental record to the customer who made the reservation.

This allows us to retrieve information about the customer associated with a particular rental such as their contact details or additional information.

Make:

The Make field in the Rentals table should also be a foreign key, referencing the primary key in the Cars table.

By using Make as a foreign key we can establish a relationship between the Rentals and Cars tables.

This allows us to link each rental record to the specific car that was rented.

We can retrieve information about the car, such as its make, model, year or any other relevant details.

By having both CID and Make as foreign keys in the Rentals table, we can create associations and maintain referential integrity between the Rentals table and the Customers and Cars tables.

These foreign keys enable us to retrieve comprehensive information about each rental including details about the customer and the car involved.

Maintaining these relationships through foreign keys ensures data consistency and integrity within the database, allowing us to perform queries and analysis that involve joining multiple tables based on these key relationships.

For similar questions on foreign

https://brainly.com/question/14632726

#SPJ11


Related Questions

In the context of the trends in technology, communication, and innovation, the creation of a digital framework:
a. made the microprocessor obsolete.
b. required satellites for all forms of communication.
c. made business communication vastly more expensive.
d. allowed high-power computer performance at low cost.

Answers

In the context of the trends in technology, communication, and innovation, the creation of a digital framework allowed high-power computer performance at low cost (option d).

The correct answer is d. The creation of a digital framework allowed for high-power computer performance at low cost. This is because a digital framework provides a standardized way for different technologies and devices to communicate with each other, allowing for more efficient and cost-effective processes. This has led to advancements in areas such as cloud computing and artificial intelligence, making it possible to process and analyze large amounts of data at a fraction of the cost it once was. Additionally, the digital framework has facilitated the development of new technologies and innovations, enabling businesses to create new products and services that would have been impossible without it.

Learn more about communication here-

https://brainly.com/question/22558440

#SPJ11

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

hy does payments constitute such a large fraction of the FinTech industry? (b) Many FinTech firms have succeeded by providing financial services with superior user interfaces than the software provided by incumbents. Why has this strategy worked so well? (c) What factors would you consider when determining whether an area of FinTech is likely to tend towards uncompetitive market structures, such as monopoly or oligopoly?

Answers

(a) lengthy and complex processes for making payments (b)  legacy systems and complex interfaces (c) regulatory requirements and substantial initial investment, can limit competition

(a) Payments constitute a significant portion of the FinTech industry due to several factors. First, traditional banking systems often involve lengthy and complex processes for making payments, leading to inefficiencies and higher costs. FinTech firms leverage technology and innovative solutions to streamline payment processes, providing faster, more secure, and convenient payment options to individuals and businesses. Additionally, the rise of e-commerce and digital transactions has increased the demand for digital payment solutions, creating a fertile ground for FinTech companies to cater to this growing market. The ability to offer competitive pricing, improved accessibility, and enhanced user experience has further fueled the growth of FinTech payment solutions.

(b) FinTech firms have succeeded by providing financial services with superior user interfaces compared to incumbents for several reasons. Firstly, traditional financial institutions often have legacy systems and complex interfaces that can be challenging for users to navigate. FinTech companies capitalize on this opportunity by designing user-friendly interfaces that are intuitive, visually appealing, and provide a seamless user experience. By prioritizing simplicity, convenience, and accessibility, FinTech firms attract and retain customers who value efficiency and ease of use. Moreover, FinTech companies leverage technological advancements such as mobile applications and digital platforms, allowing users to access financial services anytime, anywhere, further enhancing the user experience.

(c) Several factors contribute to the likelihood of an area of FinTech tending towards uncompetitive market structures such as monopoly or oligopoly. Firstly, high barriers to entry, including regulatory requirements and substantial initial investment, can limit competition, allowing a few dominant players to establish market control. Additionally, network effects play a significant role, where the value of a FinTech service increases as more users adopt it, creating a competitive advantage for early entrants and making it challenging for new players to gain traction. Moreover, data access and control can also contribute to market concentration, as companies with vast amounts of user data can leverage it to improve their services and create barriers for potential competitors. Lastly, the presence of strong brand recognition and customer loyalty towards established FinTech firms can further solidify their market position, making it difficult for new entrants to gain market share.


To learn more about technology click here: brainly.com/question/9171028

#SPJ11

I’m new to this software :)

Im new to this software :)

Answers

Answer:

yeah we are happy don know don care

How do I delete the Chrome apps folder, because I tried to remove from chrome but it won't let me

Answers

Answer:

Explanation:

1. Open your Start menu by selecting the Windows logo in the taskbar and then click the “Settings” cog icon.

2. From the pop-up menu, click “Apps.”

3.Scroll down the “Apps & Features” list to find  g00gle chrome

4. Click “G00gle Chrome” and then select the “Uninstall” button.

Hope this help!

Helped by none other than the #Queen herself

PLEASE HELP ASAP ILL GIVE YOU 5 STARS AND BRAINLEST

Explain the difference between a growth mindset and a fixed mindset. And How can you continue practicing a growth mindset when learning computer science?

Answers

Answer:

A growth mindset means that you can count on yourself, and you can use it in the real world by being positive, and confident in things you do. A fixed mindset means that you are not thinking of good things, and are not motivated, and you think that you are the worst. But in programming, practice, practice, practice!

Explanation:

If there is one thing that programming and growth mindsets have in common, it’s that you are not born with great skill, it is developed with continual practice. Similarly, one is not magically born with advanced programming skills. You can’t become a programmer without learning and practice, and you can’t go up a professional level without gaining more experience.

Growth mindset is to perform students that their talents and ability.

Fixed mindset is to perform student that their basic ability.

Given data:

A growth mindset is characterized by the belief that abilities and intelligence can be developed and improved through effort, learning, and practice. Those with a growth mindset embrace challenges, view failures as opportunities for learning, and persist in the face of obstacles. They are more likely to take risks, seek feedback, and continuously strive to improve.

In contrast, a fixed mindset involves believing that abilities and intelligence are static traits that cannot be significantly changed. Individuals with a fixed mindset may avoid challenges to avoid failure, give up easily, and view failures as a reflection of their inherent limitations. They may also be resistant to feedback and shy away from trying new things.

To learn more about growth mindset and a fixed mindset, refer:

https://brainly.com/question/17241601

#SPJ3

What are two advantages of edge computing over cloud computing?

Answers

Answer: Better Data Management

Explanation:

The main benefits of edge computing over cloud computing are: Better data management. Lower connectivity costs and better security practices. Reliable, uninterrupted connection.

Which of the following is a property issue?
A. How much should companies charge for permitting access to information in their databases?
B. How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
C. Under what circumstances can one use proprietary databases?
D. All of the answers are correct

Answers

The property issue among the given options is: A. How much should companies charge for permitting access to information in their databases?

The property issue refers to questions or concerns related to ownership, access, and usage rights of data or information. In this case, the question of how much companies should charge for granting access to their databases directly pertains to the issue of property. It involves determining the appropriate pricing and fees for accessing and utilizing the information stored in databases owned by companies.

Option B is related to data integrity and security, option C concerns the usage rights of proprietary databases, and option D states that all of the answers are correct, but only option A specifically addresses the property issue by focusing on the pricing aspect of granting access to database information.

Learn more about data transmissions here : brainly.com/question/31919919

#SPJ11

write a simple query to display the name, job, hire date and employee number of each employee from the emp table.

Answers

To display the name, job, hire date and employee number of each employee from the emp table, you can use the following SQL query: SELECT ename, job, hiredate, empno FROM emp;

This query selects the ename, job, hiredate, and empno columns from the emp table and displays them in the result set. The ename column contains the name of each employee, the job column contains their job title, the hiredate column contains the date they were hired, and the empno column contains their unique employee number.

By running this query, you will see a list of all employees in the emp table with their corresponding job, hire date and employee number. I hope this helps! To display the name, job, hire date, and employee number of each employee from the emp table, you can use the following SQL query:
```sql
SELECT name, job, hire_date, employee_number
FROM emp;
```

To know more about SQL query visit:-

https://brainly.com/question/29636807

#SPJ11

in c, the evaluation of a boolean expression stops as soon as its truth value is known. what is the name of this property?

Answers

The name of the property in C where the evaluation of a boolean expression stops as soon as its truth value is known is called "short-circuit evaluation."

In C, boolean expressions are evaluated from left to right, and the evaluation stops as soon as the truth value is known. For example, in the expression "A && B", if A is false, then the entire expression is false, and the evaluation of B is not necessary. This is because the entire expression cannot be true if A is false, regardless of the value of B.

Similarly, in the expression "A || B", if A is true, then the entire expression is true, and the evaluation of B is not necessary. This is because the entire expression cannot be false if A is true, regardless of the value of B.

Short-circuit evaluation is a useful feature in C because it can save processing time and prevent unnecessary computations, especially in situations where the evaluation of an expression involves expensive or time-consuming operations.

For more questions on short-circuit evaluation

https://brainly.com/question/26564065

#SPJ11

in c, the evaluation of a boolean expression stops as soon as its truth value is known. This property is called short-circuit evaluation.

In C, the logical operators && and || perform short-circuit evaluation. This means that when evaluating a boolean expression, if the truth value can be determined by evaluating only part of the expression, the remaining part will not be evaluated. For example, in the expression "a && b", if "a" is false, the entire expression is false, regardless of the value of "b". Therefore, "b" is not evaluated. Similarly, in the expression "a || b", if "a" is true, the entire expression is true, regardless of the value of "b", and "b" is not evaluated. This property can be useful for avoiding unnecessary computations, especially when evaluating expressions that may have side effects, such as function calls or assignment statements.

learn more about short-circuit evaluation here:

https://brainly.com/question/28902873

#SPJ11

Edhesive 4.6 lesson practice

Range is an example of a_______.

Answers

Answer:

Range is a example of a function

Answer: Function

Explanation: if you ever have trouble go look at the slide show for each presentation and theres your answer

Respond to the following in a minimum of 175 words: you have been hired to help a small company set up its first windows network. it has had the same 13 users for the entire two years it has been opened, and the company has no plans to expand. which version of windows server 2016 would you recommend

Answers

Version 1607 of windows server 2016 will be recommended by me.

What is Windows?

Windows is an operating system of computers which allows the user to perform different tasks on the computer like storing files, running software, playing games, Playing videos etc.

Now for a small company having 13 users version 1607 of windows server, 2016 will be best as an operating system as it can perform every task that you need for your work. This version found its application in the data centers where high data is processed.

To know more about windows follow

https://brainly.com/question/1594289

#SPJ1

which of the following combinations of keys is used as a short for saving a document on a computer

Answers

ctrl+s  

is used to save

Hope this helped

-scav

How are yall today pfft

Answers

Answer:

Good

Explanation:

HEYYYY

im good

anyways ik this was like 2 months ago

Pre-Test
Active
2
3
6
7
8
9
In order for a fictionalized story to be based on real events, the author should include
O characters with strong feelings
O historical matenal
O a narrator
O dialogue​

Answers

Some of the options in this question are not correct; here is the correct and complete question:

In order for a fictionalized story to be based on real events, the author should include

A. Characters with strong feelings

B. Historical material

C. A narrator

D. Dialogue​

The correct answer is B. Historical material

Explanation:

Stories, novels, and poems are said to be based on real events if these include or are inspired by real people, settings, or historical events. This includes using any historical material and adapting it to create a story. For example, the play "The Tragedy of Julius Caesar" written by Shakespeare is a play based on real events as it includes real characters such as Julius Caesar and some of the events in it are based on historical events.

According to this, the element that is necessary to make a story to be based on real events is historical material. Also, others such as a narrator, dialogue, or characters with strong feelings can be found in most stories including those that are completely fictionalized.

I need help I’m behind

I need help Im behind

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You use a really long cable to connect the desktop computer in your bedroom to the router on the other side of your house. Which of these may be a problem?

IP/MAC confusionLack of input deviceAttenuationAdaptation

The correct answer to this question is  Attenuation.

Attenuation is the loss of signal strength in networking cables or connections. This may occur when the cable is spread over a long distance.   Attenuation is typically measured in  (dB) decibels or voltage and can occur due to a variety of factors. Attenuation occurs in the cable when there is a reduction in power of the light signal as it is transmitted.

Other options are not correct because IP/MAC confusion will not occur due to long-distance cable. Lack of input device may not create the problem and adaptation also.

anybody wanna be friends?

Answers

i wouldn't mind......

yes Avacado?????????????????????

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

the firewall device must never be accessible directly from the ____________________ network.

Answers

The firewall device must never be accessible directly from the internet-facing network.

A firewall is a security device or software that helps protect networks and systems by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between different networks, such as the internet and internal networks, to prevent unauthorized access and protect against potential threats. The firewall device plays a crucial role in securing a network by inspecting and filtering network traffic based on defined policies. It establishes a secure perimeter and controls the flow of traffic between networks. To ensure the effectiveness of the firewall, it is important that it is not directly accessible from the internet-facing network. This prevents attackers from bypassing the firewall and gaining unauthorized access to the internal network. By isolating the firewall device, the network's security is enhanced, and potential vulnerabilities are minimized.

know more about firewall device :brainly.com/question/10621334

#SPJ11

Explain the operation of an electric circuit in terms of voltage, current, and charge.

Answers

If its open its broken if its closed electricity flows

Answer:

If its open its broken if its closed electricity flows

Explanation:

Karen wants to create a program that will allow the user to input their age. Which of these lines of code should be used?
print("What is your age?")
age = ("What is your age?")
age = input("What is your age?")
age = ask("What is your age?")

Answers

Answer: age = input("What is your age?")

Explanation: Since this is the syntax for inputing a variable and storing it as age

Answer:

Answer is age=input(what is your age)

Explanation: Its right because age=input your inputting your age and what is asking you hopefully it helped have a good day :)

Authentication is concerned with determining _______.

Answers

Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

Amazon describes their web services platform like this: Amazon Web Services (AWS) is a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of enterprise, start-up and public sector business with organizations in over 190 countries around the world. What does it mean for the platform to be scalable? Choose 1 answer: Choose 1 answer: (Choice A) A It is distributed across multiple data centers. (Choice B) B It can process requests for users located anywhere in the world. (Choice C) C It is relatively inexpensive for high amounts of usage. (Choice D) D It continues operating when experiencing traffic surges.

Answers

Answer:

A scalable platform enables organizations to solve large-scale business problems through the high-performance processing of massive data volumes

Explanation:

which of the following is false regarding excel tables? (1 point) filtering can be done from the drop-downs. leveled sorting can be done from the drop downs. table styles can be applied. structured references can be used in formulas.

Answers

The following statements about Excel tables are all accurate. As a result, none of them are untrue.

What does an Excel true statement mean?

Excel's logical functions include the TRUE Function[1]. The logical value of TRUE will be returned. The function is the mathematical equivalent of entering the Boolean value TRUE explicitly. The TRUE function is frequently combined with other logical functions, such as IF, ERROR, etc., in financial analysis.

What in Excel is false?

In Excel, the FALSE function is equivalent to the value 0. With the help of this function, we can carry out all mathematical operations. This function returns zero when used to multiply any number.

To know more about Excel visit:-

https://brainly.com/question/30324226

#SPJ1

volunteering ,job shadowing and internships all look good on colleage application because they show colleges the

Answers

Answer:

Volunteering, job shadowing and internships all look good on college applications because they show colleges that you are intelligent and committed to new learning opportunities.

Explanation:

Volunteering, job shadowing and internships all look good on a college application because they show colleges that would allow you to show your capabilities and would also show that you are a good person. Every college or university would want every student to help out in the world. This would also let you open more possibilities in the future too. As you grow, your mind has to grow too so this would let them know how you are able to accomplish this task and show them that you are able to do anything.

A(n) ____ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Answers

Access control is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Access control refers to the procedures and methodologies used to regulate who can access a certain system or network, as well as what they can do with the data they retrieve. These mechanisms are used to guarantee the security of an organization's resources by limiting access to only authorized personnel.

Access control mechanisms come in a variety of forms, including discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). Access control refers to the procedures and methodologies used to regulate who can access a certain system or network, as well as what they can do with the data they retrieve.

To know more about computer visit :

https://brainly.com/question/32297638

#SPJ11

You are a teaching assistant for an introductory computer concepts course at your local community college. The instructor asks you to prepare a lecture on input and output. What is the role of the operating system to manage and work with each?

This is for a college class... Please answer with a well-developed paragraph, I will mark the answer brainlist.

Answers

Answer:

Input devices : These are the devices that are used to put information or simply give input to a computer system. These are also known as peripheral devices and some of the most common examples of input devices are keyboard and mouse. Output devices… any hardware device used to send data from a computer to another device or user. examples of output devices are monitors and projectors (video), headphones and speakers (audio), or printers and plotters (physical reproduction in the form of text or graphics).

Explanation:

Hope this helps <3

In computer systems, the operating system helps devices communicate and coordinate with software applications.

The operating system helps transfer information between devices that you use to input data (like keyboards or touchscreens) and devices that show or produce output (like monitors or printers).

What is the teaching

For input management, the operating system is responsible for handling data streams coming from various input devices.

When a user interacts with an input device, such as pressing a key on the keyboard or moving the mouse, the operating system captures these actions and converts them into appropriate signals that can be interpreted by software applications.

Read more about output here:

https://brainly.com/question/31242886

#SPJ3

windows 11 has 3 accessibility categories, what are they?

Answers

Windows 11 has 3 accessibility categories Vision., Hearing., Mobility disabilities easier to find and use, making it one of the most accessible operating systems available.

Windows 11 makes accessibility tools for people with vision, hearing, and mobility disabilities easier to find and use, making it one of the most accessible operating systems available. Although PC hardware is nice, it is of little use without cutting-edge software.

What's coming to Windows 11 accessibility?

Voice access, which lets users control most of the operating system with their voice, is another new feature in the Windows 11 2022 Update. Without having to move your hands, you can open and close apps, navigate text, click things, press keyboard keys, and more with this.

What exactly are access permissions?

Android Accessibility Services was made to help app developers make their apps more accessible to people with disabilities and to help them overcome the obstacles they face when using smartphones. To take advantage of these advantages, users must enable "Accessibility Permissions" when downloading these apps.

Learn more about windows 11 :

brainly.com/question/30613269

#SPJ4

Other Questions
.Why is it important to be honest and straightforward with doctors?so they can bill for the visit appropriatelyso they can inform a patients parents correctlyso they will be able to discuss the case with other peopleso they know what medications are safe and unsafe to prescribe Help plz before 8am Which details support the central idea of Roosevelt's speech?Select each correct answer.Waging war with another country will bring prosperityto the nation.0Creating jobs will help solve unemploymentand stimulate the use of our natural resources.0Supporting farms and their products will help citiesstay a reasonable size.Preventing banks from using people's moneyfoolishly will increase personal loss of finances. (-x^2-4x-5)+ (-x^2+8x+8) PLEASE HURRY!!State the domain and range for the function f(x) = 2x - 7. why is math so hard to me but easy for everyone else what division like 31 / 16 is very hard for me A nurse pushes a 152 kg gurney. What is the normal force acting on the bed?Type your answer... Why might you choose a PC with more memory than you currently need?O better compatibility with other systemsO better future valueO greater reliabilityO easier to return or exchange Find the inverse of each function. f(x)=5x+2 -51=3-6-12x what is x which group describes the members of the democratic party who supported andrew jackson?responsesgroup agroup agroup b Given the function h of x equals three times the square root x plus 1 end root minus 2, which statement is true about h(x)? The function is decreasing on the interval (3, ). The function is decreasing on the interval (, 1). The function is increasing on the interval (, 3). The function is increasing on the interval (1, ). Which one of the following conditions must be met if the expression x=v0t 12at2 is to be used? 1. Why does the narrator take the job at Three Skeleton Key? *He wants to set aside some money before he gets married.He wants to protect the lighthouse.He wants to watch the ships sail in the nighttime.He is sent there to find three escaped convicts. Incident normal shock wave (a) An incident normal shock traveling at W = 2000 m/s in the cylindrical tube in a shock-tunnel with air ( = 1.4, R = 287 J/kgK) at 20o C = 293 K and 101 kPa reflects from a plane wall at the other end. Determine the velocity of gas (up) behind the normal shock wave.Also, determine the Mach number in this region. Is it supersonic or subsonic? Sketch the moving and stationary coordinate system for incident normal shock wave Also, determine the static and stagnation conditions (pressure, temperature, enthalpy and density) behind the incident normal shock wave. i need help with this!!!!!!!! The audible range for humans is ________.a. 380-740 Hzb. 10-20 dBc. less than 300 dBd. 20-20,000 Hz is Ambystoma maculatum Heterotroph, Autotroph, or Both In the turn of the 20th century, three items were influential to the evolution of modern gospel. What was not among them Mechanization often led to increased productivity in a business and economic sense, while it often mean long strenuous days for who?