In SQL the statement select*from R,S is equivalent to:_______(a) Select * from R natural join S(b) Select * from R cross join S(c) Select * from R union join S(d) Select * from R inner join S

Answers

Answer 1

Answer: (b) Select * from R cross join S

Explanation: The SQL query command, Select * from R, S selects each rows from table R and merges combines it with each row of table S such that the number of columns increases. The merging could be said to be horizontal in nature since it results in an increased number of data columns. The Cross join method produces the same exact result with the output all columns in both tables (R and S). The inner join combines rows in tables as well but requires that both tables have a matching column values. The union join merges data the data in both tables vertically and will not produce the same output as the SELECT * FROM R, S statement.


Related Questions

4 types of system software

Answers

Operating systems.
Device drivers.
Middleware.
Utility software.

4 types of system software: Operating Systems (OS), Device Drivers, Utilities, and Language Translators.

1. Operating Systems (OS): Operating systems are the core system software that manages computer hardware and software resources.

They provide an interface for users to interact with the computer and facilitate the execution of applications.

2. Device Drivers: Device drivers are software components that enable communication between the operating system and hardware devices like printers, graphics cards, and network adapters.

3. Utilities: System utilities perform various maintenance tasks, such as disk defragmentation, file management, backup, and system optimization.

4. Language Translators: These tools, including compilers and interpreters, translate high-level programming languages into machine code that the computer can execute.

Know more about system software:

https://brainly.com/question/30166062

#SPJ5

what is the principle that producers are entitled to make more money from a business than they invest

Answers

Answer: profit motive

Explanation: i don’t have and explanation but i just did it on apex and got it right

Which of the following are offered by most
professional organizations? Check all of the boxes
that apply.
a code of conduct
access to resources, conferences, and job
boards
help with troubleshooting computer issues
skills validation

Answers

Answer:

1. A code of conduct

2. Access to resources, conferences,and, job boards

4. skills validation

Explanation:

I just answered it

A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The correct options are A, B, and D.

What is a code of conduct?

A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The most prevalent policy within a company is a code of conduct. This policy outlines the company's beliefs, standards, and moral and ethical expectations for workers and third-party interactions with the firm.

From the given set of options, the options that are offered by most professional organizations are,

A code of conductAccess to resources, conferences, and job boardsSkills validation

Hence, the correct options are A, B, and D.

Learn more about the Code of Conduct here:

https://brainly.com/question/12990307

#SPJ2

SQL a. has become the de facto standard database language b. can be used to define database systems c. both a. and b. d. none of the above

Answers

Answer:

a.)has become the de facto standard database language

Explanation:

SQL known as Structure Query Language can be described as domain specific language that is Been used in execution of tasks son database. Those task could be updating of data.

Database admistraion.

Microsoft SQL server is one of the example of database system that uses SQL.

It should be noted that SQL has become the de facto standard database language

Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output those four values on a single line separated by a space.Enter integer:99Enter double:3.77Enter character:zEnter string:Howdy99 3.77 z Howdyimport java.util.Scanner;public class BasicInput {public static void main(String[] args) {Scanner scnr = new Scanner(System.in);int userInt;double userDouble;// FIXME Define char and string variables similarlySystem.out.println("Enter integer:");userInt = scnr.nextInt();// FIXME (1): Finish reading other items into variables, then output the four values on a single line separated by a space

Answers

Answer:

import java.util.Scanner;

public class BasicInput {

   public static void main(String[] args) {

       //Create an object of the Scanner class

       Scanner scnr = new Scanner(System.in);

       

       //Define int and double variables

       int userInt;

       double userDouble;

       

       //Define char and string variables similarly

       char userChar;

       String userString;

       

       //Prompt the user to enter an integer

      System.out.println("Enter integer:");

       //Store the input in the integer variable

       userInt = scnr.nextInt();

       

       //Prompt the user to enter a double

        System.out.println("Enter double:");

       //Store the input in the double variable

      userDouble = scnr.nextDouble();

       

       //Prompt the user to enter a char

        System.out.println("Enter char:");

       //Store the input in the char variable

      userChar = scnr.next().charAt(0);

       

       //Prompt the user to enter a string

        System.out.println("Enter String:");

       //Store the input in the string variable

      userString = scnr.next();

       

       //Output the four values on a single line

       //separated by a space

       System.out.println(userInt + " " + userDouble + " " + userChar + " " + userString);

       

   }

   

}

Sample Output:

Enter integer:

>>12

Enter double:

>>23

Enter char:

>>s

Enter String:

>>asdasd

12 23.0 s asdasd

Explanation:

The code above has been written in Java. It contains comments explaining every part of the code. Please go through the comments.

#TODO: Define a data structure to keep track of which links are part of / not part of the spanning tree.

Answers

Answer:

A spanning tree is a subset of Graph G, which has all the vertices covered with minimum possible number of edges. Hence, a spanning tree does not have cycles and it cannot be disconnected.. By this definition, we can draw a conclusion that every connected and undirected Graph G has at least one spanning tree.

Compare WiFi hotspot and cyber cafe ??? I will give you slot of points HELP!!!

Answers

Explanation:

A WiFi hotspot is a wireless internet connection that allows a computer, smartphone, or other internet-enabled devices to connect to internet access points.

While a Cybercafe (internet cafe) refers to any business space which allows people to access the internet usually within its premises after paying for connection access. Unlike Wifi hotspot, a cybercafe in most cases provides computers to their customers.

Answer:

ExplanatiA WiFi hotspot is a wireless internet connection that allows a computer, smartphone, or other internet-enabled devices to connect to internet access points.

While a Cybercafe (internet cafe) refers to any business space which allows people to access the internet usually within its premises after paying for connection access. Unlike Wifi hotspot, a cybercafe in most cases provides computers to their customers.on:

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

Answers

Answer:

The correct solution is "Sponge ".

Explanation:

The method of transforming data into unreadable text is synonymous with cryptography, as well as vice-versa.The sponge configuration throughout cryptography seems to be a method of thought, based on a specific-length possible combination as well as a formatting law, which constructs a mechanism connecting variable-length information through variable-length release.

You are configuring two PCs for your network, PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192.168.1.33. Both PCs receivces a subnet mask of 255.255.255.240A) what is network address of PC-A?B) what is network address of PC-B?C) will these PCs be able to communicate directly wiyh each other?D) what is the highest address that can be given to PC-B that allows it to be on the same network as PC-A ?

Answers

Answer:

Explanation:

a) 192.168.1.16

b) 192.168.1.32

c) No

d) 192.168.1.30

Answer:

It’s somethint

Explanation:

Which of the following situations would notqualify for the fair use exception to United States copyright law?A) Google posts thumbnail images of books in the Google Book Search Project.B) A student copies a photograph of his favorite band from a Web site created by the band's record label andplaces it on the student's personal Web site. C) A professor clips a newspaper article just before class and distributes copies of it to his class.D) A journalist quotes a paragraph from a book in a review of the book.

Answers

Answer:

C. A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.

Explanation:

Because this is deemed an offence as the student never got a formal copyingpermit

What is Game Theory?
Study of strategic decision making
elements of support for effective support of a system
the imitation of the operation of real-world process or system over time
decentralized communications model

Answers

Answer:

the branch of mathematics concerned with the analysis of strategies for dealing with competitive situations where the outcome of a participant's choice of action depends critically on the actions of other participants

Explanation:

In simple terms Game theory is the study of how and why people make decisions.

In a C++ program, one and two are double variables and input values are 10.5 and 30.6. After statement cin >> one >> two; executes________ a) one = 10.5, two = 10.5 b) one = 11, two = 31 c) one = 30.6, two = 30.6 d) one = 10.5, two = 30.6

Answers

Answer:

The answer is "Option d"

Explanation:

In the given C++ program code, It is defined, that two double type variable "one and two" is defined, that holds the two double value that is "10.5 and 30.6".

In this code, it uses the "cin" method for input values from the user ends, when we execute this code, it provides the console screen, that inputs the double type value from the user side, and other given choices were wrong because it holds different values.

Write a program that reads the subtotal and the gratuity rate, then computes the gratuity and total.For example, if the user enters 10 for subtotal and 15% for gratuity rate,the program displays $1.5 as gratuity and $11.5 as total.Sample RunEnter the subtotal and a gratuity rate: 10 15The gratuity is $1.5 and total is $11.5Class Name: Exercise02_05

Answers

Answer:

Using Javascript,

function calTotal( subtotal, gratuity){

  gratuityValue = subtotal * (gratuity/100)

  total = subtotal + gratuityValue

  console.log( "gratuity: ", gratuityValue , "\nTotal: ", total)

}

Explanation:

The javascript function above is able to collect two parameters subtotal and gratuity rate in percentage and calculate the total and gratuity value, and displays it on the console.

Mention five specific techniques you can use to improve your written documents.

Answers

Answer:

The answer is below

Explanation:

There are various techniques an individual can use to improve his or her written documents, some of which considered to be specific are:

1. Understand the targeted readers.

2. Do not be ambiguous or avoid ambiguity

3. Always use active voice pattern whenever possible

4. Perform second reading, and edit where necessary

5. Avoid repetition of words too often.

Which of the following is considered data?A. Quantity sold.B. Best customer by month.C. Best selling item by month.D. Worst selling item by month.

Answers

Answer:

A

Explanation:

A.

what is the purpose of social networking sites

Answers

Explanation:

social networking sites allow users to share ideas, digital photos and videos, posts, and to inform others about online or real world activities and events with people in their network.

2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element in . Then find the second smallest A AOE1 element of A, and exchange it with . Continue in this manner for the firs AOE2 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the firs elements, rather than for all elements? Give the best-case n 1 n and worst-case running times of selection sort in ‚-notation.

Answers

Answer:

Follows are the explanation of the choices:

Explanation:

Following are the Pseudocode for selection sort:                      

for j = 0 to k-1 do:

      SS = i

      For l = i + 1 to k-1 do:

        If X(l) < X(SS)

          SS= l

        End-If

      End-For

      T = X(j)

      X(j) = X(SS)

      X(SS) = T

    End-For

Following are the description of Loop invariants:

The subarray  A[1..j−1] includes the lowest of the j−1 components, ordered into a non-decreasing order, only at beginning of the iteration of its outer for loop.  

A[min] is the least amount in subarray A[j.. l−1] only at beginning of the each loop-inner iterations.                      

Following are the explanation for third question:

Throughout the final step, two elements were left to evaluate their algorithm. Its smaller in A[k-1] would be placed as well as the larger in A[k]. One last is the large and medium component of its sequence because most and the last two components an outer loop invariant has been filtered by the previous version. When we do this n times, its end is a repetitive, one element-sorting phase.

Following is the description of choosing best-case and worst-case in run- time:

The body the if has never been activated whenever the best case time is the list is resolved. This number of transactions are especially in comparison also as a procedure, that will be (n-1)(((n+2)/2)+4).    

A structure iterator at every point in the worst case that array is reversed, that doubles its sequence of iterations in the inner loop, that is:(n−1)(n+6) Since both of them take timeΘ(n2).

Referencing Microsoft Word:1. How can you save a document created using Word 2016 in a PDF format? Explain the process step by step.2. Assuming you are on the home tab, explain which tabs and buttons you would need to select to open a new blank document?3. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add the "Quick Print" icon to the Quick Access Toolbar.4. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add a bibliography to the document.5. Assuming you are on the home tab, explain which tabs and buttons you would need to select to put a picture within your document?6. Assuming you are on the home tab, explain which tabs and buttons you would need to select to change the page orientation to Landscape?7. What is the purpose of the "ribbon"?8. The Help button from previous versions of Office has been replaced by what words and what symbol?

Answers

Answer:

Referencing Microsoft Word:

1. How can you save a document created using Word 2016 in a PDF format? Explain the process step by step.

Step 1: Click on File Tab

Step 2: Click on Save As Button

Step 3: Select File Location for the document

Step 4: Name the document

Step 5: Save type: Select pdf

Step 6: Save

2. Assuming you are on the home tab, explain which tabs and buttons you would need to select to open a new blank document?

Step 1: Click on File Tab

Step 2: Click on New Button

Step 3: Select or Click Blank Document

3. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add the "Quick Print" icon to the Quick Access Toolbar.

Step 1: Click on File Tab

Step 2: Select Options Button

Step 3: Select Quick Access Toolbar

Step 4: Select Quick Print

Step 5: Click on Add

4. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add a bibliography to the document.

Step 1: References Tab

Step 2: Click Bibliography

Step 3: Insert Bibliography or create as required.  

5. Assuming you are on the home tab, explain which tabs and buttons you would need to select to put a picture within your document?

Step 1: Click on File Tab

Step 2: Click the Open Button

Step 3: Click on Library

Step 4: Select Picture Location

Step 5: Select Picture

Step 6: Click Add

6. Assuming you are on the home tab, explain which tabs and buttons you would need to select to change the page orientation to Landscape?

Step 1: Click Layout Tab

Step 2: Select Orientation

Step 3: Click Landscape

7. What is the purpose of the "ribbon"?

The "ribbon" contains the 8 tabs on the Quick Access Toolbox: File, Home, Insert, Page Layout, References, Mailings, Review, and View.  The "ribbon" groups these specific command categories called tabs.

8. The Help button from previous versions of Office has been replaced by what words and what symbol?

It has been replaced with the lightbulb symbol with these words: “Tell me what you want to do…”  And you can also type Alt + Q to get the same help assistance.

Explanation:

The ribbon is a user interface element created by Microsoft and includes the roll of tabs and buttons.  The Ribbon tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories.

There are eight tabs along on the ribbon: File, Home, Insert, Page Layout, References, Mailings, Review, and View. Each tab relates to different activities that you can carry out when creating a document.  For example, if you want to save a new document, you click on the File tab which takes you to the Save As button where you choose the file location and save as required.

What is a characteristic of maintaining logs in a system? A. Logging prevents security violations, but only deals with passive monitoring. B. Logging provides access control by authenticating user credentials. C. Logging helps an administrator to detect security breaches and vulnerable points in a network

Answers

Answer:

The correct answer is C

Explanation:

When analysed, logs can help to forestall security breaches to a network it can also help to identify and resolve any vulnerabilities within the system.

Due to the number of logs generated daily, it is almost impracticable to constantly monitor all logs generated by the system.

Cheers!

Check
Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that
apply.

Answers

Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that

apply.

Indent the ideas in the bulleted list.

Change the number level of the list.

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Pick the number format to be used in the list.

Answer:

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Explanation:

When using Microsoft Word text editor, when the drop-down menu of the bullet icon is clicked, the following tasks can be accomplished which are to choose the bullet to be used in the list and define the new bullet to be used in the list.

A bullet is used to identify or list out important items, sometimes in ascending order, and are used to organize information to make the important points easy to pick out.

Answer:

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Explanation:

.

How Oracle 12c advances the security discussion?

Answers

Answer: The oracle 12 c advances are given below.

Explanation:

The oracle 12 c provides the ability to tag the data with the label of data. It provides the classification to the data. This allows to check which data is sensitive and also allows the combination of sensitive data to be combined with the same table as the bigger data without compromising the security of the database.

What are three purposes of the Media Creation Tool application?

Answers

Answer:

The first purpose fo the Media Creation Tool Application is:

to enable the creation or building the Windows 10 installation media. The Windows 10 installation media is not Windows 10It can also be used to repair an existing installationIt is used to make a bootable USB memory stick for use in the installation of Windows 10

Cheers!

The three purposes of the Media Creation Tool application are:

To stored data.To download a Windows 10 install file.To reinstall Windows 10.

What is the purpose of the media creation tool?

The Media Creation Tool is known to be an application that helps a person to be able to download a Windows 10 install file.

Here the person can get this file and put it into a flash drive or a DVD and then one can save it  so that one can be able to still use it to reinstall the Windows 10. It is known to act as a kind of backup option in case your system has malfunctions.

Learn more about Media Creation from

https://brainly.com/question/1114645

This is C++
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
(2) Extend to also calculate and output the amount of paint in gallons needed to paint the wall. Assume a gallon of paint covers 350 square feet. Store this value using a const double variable. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
(3) Extend to also calculate and output the number of 1 gallon cans needed to paint the wall. Hint: Use a math function to round up to the nearest gallon. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
Cans needed: 1 can(s)

Answers

Answer:

#include <cmath>

#include<iostream>

using namespace std;

int main()

{

double height, width;

cout<<"Enter wall height (feet): ";

cin>>height;

cout<<"Enter wall width (feet):  ";

cin>>width;

//1

double area;

area = width * height;

cout<<"Wall area: "<<area<<" square feet"<<"\n";

//2

const double gallon = area/350.0;

cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";

//3

cout << "Cans needed :" << round(gallon) << " can(s)";  

return 0;

}

Explanation:

This line declares the height and width as double

double height, width;

This line prompts user for height

cout<<"Enter wall height (feet): ";

This line gets user input for height

cin>>height;

This line prompts user for width

cout<<"Enter wall width (feet):  ";

This line gets user input for width

cin>>width;

//1  Question 1 begins here

This line declares area as double

double area;

The line calculates area

area = width * height;

The line prints the calculated area

cout<<"Wall area: "<<area<<" square feet"<<"\n";

//2  Question 2 begins here

This line declares and calculates gallon as a constant double variable

const double gallon = area/350.0;

This line prints the calculated gallon

cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";

//3  Question 3 begins here

This line rounds gallon to nearest whole number and prints the result

cout << "Cans needed :" << round(gallon) << " can(s)";  

Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.

Answers

Answer:

ALU :An arithmetic logic unit (ALU) is a digital circuit used to perform calculations and logic operations

Registers:register holds the address of memory where CPU wants to read or write data.

CU:The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the processor.

BIU:BIU takes care of all data and addresses transfers on the buses for the EU like sending addresses, fetching instructions from the memory, reading data from the ports and the memory as well as writing data to the ports and the memory.

Cache:Cache is used to temporarily hold instructions and data that the CPU is likely to reuse.

FPU:A floating-point unit (FPU, colloquially a math coprocessor) is a part of a computer system specially designed to carry out operations on floating-point numbers.

Explanation:

This is all I can say

Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family?nd her family recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family?

Answers

Answer:

wifi is the best network for all, As it gets in all corners of the house.

Order the steps for using the Rules Wizard to create an email rule.

Answers

Answer:

The answer is in the attached file below.

Explanation:

Where do today's computers store almost all motherboard configuration data?A) BIOS ROMB) CMOS RAMC) DIMM RAMD) Solid State Disk

Answers

Answer:

In the CMOS RAM

Explanation:

It's the only answer that is available. New computer's store the data in TPM (Trusted Platform Module) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

Today's computers store almost all motherboard configuration data in CMOS RAM (Complementary Metal-Oxide-Semiconductor Random Access Memory). (Option B)

How  is this so?

CMOS RAM is a type of non-volatile memory that retains data even when the computer is powered off. It is typically powered by a small battery on the motherboard.

The configuration data stored in CMOS RAM includes settings such as system date and time, boot order, hardware settings, and other BIOS (Basic Input/Output System) configurations.

Thus the correct answer is Option B - Complementary Metal-Oxide-Semiconductor Random Access Memory

Learn more about motherboard  at:

https://brainly.com/question/12795887

#SPJ6

Multiple Choice
Choose the answer that best answers the question.
Read the following sentence. The underlined phrase is an idiom that uses figurative language. What could this phrase mean?
When you work on your project, you shouldn't bite off more than you can chew by working on too much at one time.
O A Don't talk with food in your mouth.
O B. Don't do more than you can handle.
c. Don't eat too much food,
D. Don't eat someone else's food.

Answers

Answer:

dont do more then you handle

A computer has 38 address lines. How many locations in Mega bytes can it address?

Answers

Answer:

The computer can address 34359,738368 megabytes

Explanation:

Given

Address Lines (n) = 38

Required

Determine the number of location it can address

Number of addressable locations (N) in bits is calculated as thus

[tex]N = 2^n.[/tex]

Substitute 38 for n

[tex]N = 2^{38}[/tex]

[tex]N = 274877906944\ bits[/tex]

Next; is to convert from bits to megabytes

Start by converting to bytes

1 bit = 0.125 bytes;

So;

[tex]N = 274877906944 * 0.125\ bytes[/tex]

[tex]N = 34359738368\ bytes[/tex]

Convert from byte to megabyte

[tex]1\ byte = 10^{-6}\ megabyte[/tex]

So;

[tex]N = 34359738368\ * 10^{-6}\ MB[/tex]

[tex]N = 34359,738368\ MB[/tex]

Hence, the computer can address 34359,738368 megabytes

Expain the application areas of ICT in education sector and E-commerce​

Answers

Explanation:

Nowadays almost all the school and college use computers in classrooms and labs to teach students.A teacher can teach effectively using computer-based presentations.Students can study different subjects and complete their assignment by using different software in computer.The Computer Based Training(CBT) and Web Based Training(WBT) are aid to teach the student in the classroom.

E-commerce is a financial business transaction conducted electronically between business partners over the internet.Business transactions can occur very quickly and globally.The people can buy,sell and exchange the products or services using internet.Todays many computer can also access the Internet through wireless technologies.

Other Questions
What's Going On in This Picture? Is 536 cm greater or less then 53.6 DM Physical and chemical are two types of __________ 3Liz makes footprints in the snow with her boots that arefoot long. Liz's feet are only23foot long.What expression can be used to find out how much longer Liz's boot prints are than her feet? Use Pascals Triangle to determine the fifth term of the expansion of (x + 3)7 What are the three elements that build carbohydrates? Zara has forgotten her 4-digit PIN code. She knows the first digit is a factor of 20 and the 4 digits make a number divisible by 5. How many different sets of 4 digits could it be? What allowed for the Europeans to have a "Garden of Eden without humans"? PLEASE HELP ME I REALLY NEES HELPChanges of StateGasBTemperatureSolidLiquidAThermal Energy4. Suppose the material is being heated.a. What change of state is represented by line segment A?b. What is happening to the average kinetic energy of the particles during thechange of state represented by line segment B? Explain.c. What physical property does the temperature at point B represent? If theliquid is kept at this temperature what state of matter will be observed?Explain your answer. What does it mean if data are reproducible but not accurate?O The data can be produced over and over but are not close to the accepted value.O The data are close to the accepted value but cannot be produced over and overO The data are close to the accepted value and are close to one anotherO The data are close to the accepted value but are not close to one another A ball with a mass of 3.7 kg is thrown downward with an initial velocity of 8 m/s from a high building. How fast will it be moving after 3 seconds? What is the mean of 6,3,2,1,9,9 Can you simplify this algebraic expression? Type your answer below!(2x-4) - (6x +6) greatest 2 factors of 90 A new sunscreen has been developed that is supposed to be more effective at preventing sunburn. 30 participants spray one arm with the new formula and spray the other arm with the leading formula. After 4 hours in the sun, their skin is evaluated for any redness.What is the Independent Variable?a. the 30 arms with the old formulab. the 30 arms with the new formulac. Amount of rednessd. Type of sunscreene. the 15 arms with the new formula I keep getting different answers. Can somone explain how I would set it all up? On Saturday, the fruit and juice bar was selling 29 glasses of fruit punch an hour. By 7 p.m., they had sold 261 glasses. If their goal was to sell more than 348 glasses of fruit punch, find the number of hours, h, they must stay open to make their goal. Algonquian is:REO A. A Native American language group.OB. A Native American war.O C. A Native American government.D. A Native American religious tradition. How do I solve this problem NEED HELP RIGHT NOW!!! Which of the following is the definition of a privacy policy? * 5 points - A legal document that an app or a website must provide explaining which user information they collect and how it is used. - A legal document that an app or a website must provide to describe the rules the company and users must obey when they use the app. - Choices a website or an app provides users about which information is collected and visible to others. - Small text files stored on a computer that keep track of what a person does on a website.