The compound known as butylated hydroxytoluene, abbreviated as BHT, contains carbon, hydrogen, and oxygen. A 1.126 g sample of BHT was combusted in an oxygen rich environment to produce 3.373 g of CO2(g) and 1.105 g of H2O(g). Insert subscripts below to appropriately display the empirical formula of BHT.
In: Chemistry
Data show that an average Canadian and American citizen hold CA$2000 and US$4000 of their currency respectively. Since money is bulky, it can be stolen, pays no interest and in general we do not see our fellow Canadians holding $2000 in their pockets, where are these dollars and who is holding them?
In: Economics
If you were designing your distributed database system to maximize system availability, you would use:
| A. |
Distributed lock management |
|
| B. |
Centralized Lock Management |
|
| C. |
Centralized Commit Protocol |
In: Computer Science
Subject: Accounting information system/Resource event agent(REA)
Question: Briefly explain how the REA system replaces the need for journals and ledgers and is still able to provide the data for an accounting database.
In: Accounting
Although database systems have become the system of choice for new and reengineered systems, are there any situations where a traditional file based system might be chosen instead? Explain your answer with examples.
In: Computer Science
Which of the following represents the greatest risk? Group of answer choices
The director of IT (a key employee) resigned
An IT hardware failure occurred
The president of the company was fired for embezzlement
The company’s database is corrupted with no backup facilities
In: Computer Science
Views are virtual in the database but Materialized view are persistent. Discuss the need to have materialized view instead of views and in what condition No materialization if preferred.
I need a unique answer and without handwriting, please.
In: Computer Science
Suppose the incidence rate of myocardial infarction (MI)
was 5 per 1000 among 45- to 54-year-old men in 2000.
To look at changes in incidence over time, 5000 men in this
age group were followed for 1 year starting in 2010. Fifteen
new cases of MI were found.
7.12 Using the critical-value method with α = .05, test
the
hypothesis that incidence rates of MI changed from 2000
to 2010.
7.13 Report a p-value to correspond to your answer to
Problem 7.12.
Suppose that 25% of patients with MI in 2000 died within
24 hours. This proportion is called the 24-hour case-fatality
rate.
7.14 Of the 15 new MI cases in the preceding study,
5 died within 24 hours. Test whether the 24-hour case
fatality
rate changed from 2000 to 2010.
7.15 Suppose we eventually plan to accumulate 50 MI
cases during the period 2010–2015. Assume that the
24-hour case-fatality rate is truly 20% during this period.
How much power would such a study have in distinguishing
between case-fatality rates in 2000 and 2010–2015
In: Statistics and Probability
You have been hired to evaluate an accounting information system for fixed asset inventory tracking to determine if proper controls and security are present for financial reporting. You notice the company has a number of items in inventory but there does not seem to be any pattern to the data they collect. For example, some items have a location or department where the item is located others do not, some items have a tracking tag, others do not, etc. How would you set up a fixed asset database for this company to ensure proper controls over the data, security of the items, and the accuracy of the data for financial reporting?
Provide an example of your database(s) design and why you selected that design.
In: Accounting
topic:- Fundamentals of Databases
*********** no hand writing*********
If there is photo but photo don’t do fax ?
*the answer must be unique not copied "plagiarized "
question One
Consider the following two tables:
Table – EmployeeInformations
EmpId Name ManagerId DateOfJoining
121 Ali 321 01/31/2014
321 Raed 986 01/30/2015
421 Khaled 876 27/11/2016
Table – EmployeeSalary
EmpId Project Salary
121 P1 8000
321 P2 1000
421 P1 12000
Question
Explain the role of SQL authorization mechanisms that allow to differentiate among the users of the database as far as the type of access they are permitted on various data values in the database?
In: Computer Science