screenshot of sql queryselect * from employee where jobcode = 'fte' and lastname = 'james' what does the asterisk (*) after select tell the database to do in this query?

Answers

Answer 1

The asterisk (*) after the "SELECT" keyword in the given SQL query instructs the database to retrieve all columns from the "employee" table that match the specified conditions.

In SQL, the asterisk (*) is a shorthand notation used in the "SELECT" statement to represent all columns in a table. By including the asterisk after "SELECT" in the query

"SELECT * FROM employee",

the database understands that it should retrieve all columns from the "employee" table. This means that the query will return all the data (all columns) for the rows that satisfy the conditions specified in the "WHERE" clause, which in this case are

"jobcode = 'fte'" and "lastname = 'james'".

To know more about SQL queries click here: brainly.com/question/30755095

#SPJ11


Related Questions

what is the minimum possible number of nodes in a ternary search tree (tst) containing 5 words of length 6?

Answers

The minimum possible number of nodes in a ternary search tree (TST) containing 5 words of length 6 is 25.

A ternary search tree (TST) is a type of tree structure that is often used for efficient searching and retrieval of data. It is similar to a binary search tree but allows for three branches at each node instead of two.

To determine the minimum possible number of nodes in a TST containing 5 words of length 6, we need to consider the structure of the tree. Each node in the TST represents a character in the words, and the branches from each node correspond to the possible next characters in the words.

In a TST, each node can have three branches: one for characters less than the current node's character, one for characters equal to the current node's character, and one for characters greater than the current node's character.

For words of length 6, there will be six levels in the TST, one for each character in the word. At each level, the number of nodes will depend on the number of distinct characters encountered. In the worst case, each character in the word is distinct, resulting in three branches at each node.

Therefore, the minimum possible number of nodes in the TST containing 5 words of length 6 would be the sum of nodes at each level: 1 + 3 + 9 + 27 + 81 + 243 = 364. However, it's worth noting that this is the maximum possible number of nodes in the TST. The actual number of nodes may be smaller if there are duplicate characters or shared prefixes among the words. In this case, the minimum possible number of nodes would be 25.

Learn more about ternary search tree here:

brainly.com/question/31961382

#SPJ11

Write a query that will list all the cities that have customers
with a heading of Cities. Only list each city once (no duplicates)
and sort in descending alphabetical order.
Write a query that display

Answers

To list all the cities with customers, without duplicates, in descending alphabetical order, the following SQL query can be used:

SELECT DISTINCT City AS Cities

FROM Customers

ORDER BY City DESC;

The query retrieves data from the "Customers" table and selects the "City" column. The "DISTINCT" keyword is used to eliminate duplicate cities from the result set. By specifying "AS Cities", the column heading is set to "Cities". Finally, the "ORDER BY" clause sorts the cities in descending alphabetical order. The "SELECT DISTINCT" statement ensures that each city appears only once in the result set, regardless of the number of customers associated with that city. This prevents duplicate entries and provides a concise list of unique cities. The "ORDER BY" clause with "City DESC" sorts the cities in descending order based on the city name. This ensures that the cities are displayed in reverse alphabetical order, from Z to A.

Learn more about reverse alphabetical order here:

https://brainly.com/question/32855840

#SPJ11

True or false: a social network can be characterized as a patterned set of relationships between two or more people.

Answers

True. A social network can be defined as a patterned set of relationships between two or more individuals.

This statement is true. A social network refers to the intricate web of connections and interactions between individuals, where relationships are established and maintained. These relationships can be based on various factors such as friendship, kinship, work associations, or shared interests. Social networks can be analyzed and visualized through nodes (representing individuals) and edges (representing connections between them). The patterns within these networks provide insights into how information, resources, and influence flow among individuals. Studying social networks helps in understanding social dynamics, spread of information, social support systems, and even predicting behaviors within a given population.

For more information on social network visit: brainly.com/question/8997448

#SPJ11

What purpose do the ‘corrective’ decision trees serve in
controlling the manufacturing process?

Answers

'Corrective' decision trees serve the purpose of controlling the manufacturing process by identifying and addressing deviations or issues that occur during production.

'Corrective' decision trees are a tool used in manufacturing to control and improve the production process. These decision trees are designed to identify and address any deviations or issues that may arise during the manufacturing process. They serve as a systematic approach to identifying the root causes of problems and providing corrective actions to mitigate or eliminate those issues.

The decision trees are constructed based on the knowledge and expertise of the manufacturing experts, who analyze historical data, conduct experiments, and use their domain knowledge to develop a set of rules or conditions that guide the decision-making process. These decision trees are typically created using machine learning techniques, such as classification algorithms, which learn from historical data and patterns to make informed decisions.

Once the decision trees are in place, they can be used in real-time to monitor the production process. If any deviations or issues occur, the decision tree will analyze the data and follow the predefined rules to determine the appropriate corrective actions. These actions can range from adjusting process parameters, recalibrating equipment, or initiating maintenance activities to ensure that the manufacturing process continues to meet the desired quality standards.

By using 'corrective' decision trees, manufacturers can proactively identify and address potential issues, minimize production downtime, reduce waste, and improve overall product quality. These decision trees enable a systematic and data-driven approach to problem-solving, ensuring consistent and efficient control over the manufacturing process.

Learn more about production here: https://brainly.com/question/32172983

#SPJ11

identify two (2) best practices for security requirements for laptops that may store sensitive info. quizlet

Answers

When it comes to security requirements for laptops that may store sensitive information, there are several best practices that you can follow to ensure the protection of the data.

One of the key ways to secure sensitive information on a laptop is by encrypting the data. Encryption is the process of converting data into a format that can only be read or accessed with the use of a decryption key. By encrypting the data on a laptop.

There are various encryption methods available, such as full disk encryption, which encrypts the entire hard drive, or file-level encryption, which encrypts specific files or folders. It is important to choose a strong encryption algorithm and to regularly update encryption software to ensure the highest level of security.

To know more about security visit:

https://brainly.com/question/33718338

#SPJ11

Which of the SMART framework components are missing from this objective: - Achieve an increase in customers of 20% in the next fiscal year a) Measurable, Specific, Achievable b) Time-bound, Specific, Measurable c) Specific, Achievable, Time-bound d) none of them Why?

Answers

Option (b) "Time-bound, Specific, Measurable" is the correct answer. The objective is time-bound because it specifies achieving the increase in customers within the next fiscal year.

The SMART framework is a useful tool for setting effective objectives. It stands for Specific, Measurable, Achievable, Relevant, and Time-bound. In the given objective of achieving a 20% increase in customers in the next fiscal year, the missing component from the SMART framework is "Measurable."

While the objective is specific, stating the desired increase in customers and time-bound, as it specifies achieving the goal within the next fiscal year, it lacks measurability. A measurable objective should include a clear metric or baseline to assess progress and determine when the goal has been achieved. In this case, the objective would benefit from specifying the current number of customers and the target number needed to achieve a 20% increase.

Therefore, option (b) "Time-bound, Specific, Measurable" is the most accurate choice as it identifies the missing component of measurability in the given objective.

Learn more about SMART framework here:

https://brainly.com/question/30770883

#SPJ11

Devmanview can be used to display device lists of another computer on a network, as long as the investigator has?

Answers

Sufficient permissions and access rights are required to use DevManView and display device lists of remote computers on a network.

DevManView is a software tool developed by NirSoft that allows users to view the device lists of computers on a network. However, in order to use DevManView to display the device lists of another computer, the investigator must have sufficient permissions and access rights. This means that the investigator needs to have the necessary privileges to access and retrieve device information from remote computers on the network.

Typically, accessing device lists of remote computers requires administrative or elevated privileges. The investigator must be authorized and granted appropriate permissions to view and retrieve device information from the target computer. Without the necessary permissions, DevManView or any similar software tool will not be able to display the device lists of remote computers on the network.

To learn more about software click here

brainly.com/question/29840145

#SPJ11


Describe stereo photographic coverage, and why it is useful.

Answers

Stereo photographic coverage refers to the use of two or more photographs taken from different angles to create a three-dimensional (3D) view of an object or area.

It involves capturing images of the same scene or object using two or more cameras, usually with a certain distance between them. The resulting photographs are then viewed together using specialized equipment or techniques to create a sense of depth and perspective.

Stereo photographic coverage is useful in various fields for several reasons. Firstly, it provides a realistic and immersive representation of objects or scenes, allowing for a more accurate and detailed visual assessment. This can be particularly helpful in fields such as geology, archaeology, and engineering, where accurate measurements and assessments are crucial.

To know more about Stereo visit:

https://brainly.com/question/28827830

#SPJ11

Which factor other than documented evidence, would the nurse consider in an evidence based prctuce?

Answers

In addition to documented evidence, nurses consider the factor of clinical expertise and experience when practicing evidence-based care.

Evidence-based practice involves integrating the best available evidence, clinical expertise, and patient preferences to make informed healthcare decisions. While documented evidence, such as research studies and clinical guidelines, plays a crucial role in evidence-based practice, nurses also rely on their own clinical expertise and experience.

Clinical expertise refers to the nurse's knowledge, skills, and experience gained through years of practice in a specific area. It encompasses the nurse's ability to critically analyze and interpret research findings, apply them to individual patient situations, and make sound clinical judgments. Nurses draw upon their expertise to adapt evidence to the unique needs and preferences of their patients.

In evidence-based practice, the nurse considers not only the documented evidence but also the context of the patient, their values, and the nurse's own clinical experience. This integration of evidence, expertise, and patient preferences helps ensure that care decisions are individualized, effective, and aligned with the best available evidence.

Learn more about evidence-based care here: brainly.com/question/32307433

#SPJ11

What is the cooling capacity in tons, for a cooling tower circulating 35,819 pounds of water per minute?

Answers

The cooling capacity in tons for a cooling tower circulating 35,819 pounds of water per minute is approximately 17.91 tons.The cooling capacity of a cooling tower is typically measured in tons. To calculate the cooling capacity in tons, we need to convert the pounds of water per minute to tons.

1 ton of cooling capacity is equivalent to 12,000 British thermal units (BTUs) per hour.
Step 1: Convert pounds to tons:
Since there are 2,000 pounds in a ton, we can divide the pounds by 2,000 to get the value in tons.
35,819 pounds ÷ 2,000 = 17.91 tons

Step 2: Convert tons to BTUs:
To convert tons to BTUs, we multiply the tons by 12,000.
17.91 tons × 12,000 BTUs = 214,920 BTUs
Therefore, the cooling capacity in tons for a cooling tower circulating 35,819 pounds of water per minute is approximately 17.91 tons.

To now more about capacity visit:

https://brainly.com/question/32976115

#SPJ11

a hard disk with a 1kb sector, 2000 rpm, 2ms average seek time , 0.1ms controller overhead, and 300mb/s transfer rate. compute average read time.

Answers

The average read time for the hard disk can be computed by adding the average seek time, controller overhead, and the time taken to transfer the data from the disk.

The average read time consists of multiple components. The first component is the average seek time, which represents the time it takes for the read/write head of the hard disk to move to the desired sector. In this case, the average seek time is given as 2ms.

The second component is the controller overhead, which is the time taken by the disk controller to process the request and coordinate the data transfer. The given controller overhead is 0.1ms.

The third component is the time taken to transfer the data from the disk. This is determined by the transfer rate of the hard disk. In this case, the transfer rate is given as 300mb/s.

To compute the average read time, we add the average seek time, controller overhead, and the time taken for data transfer. Given the sector size of 1kb, we divide it by the transfer rate to get the time taken for data transfer per sector. Then, we sum up all the components.

Please note that this calculation assumes a simplified model and does not take into account factors like rotational latency or additional overheads. In practice, the actual read time may vary due to various hardware and system considerations.

To learn more about disk click here:

brainly.com/question/32363734

#SPJ11


How are images from satellite scanners different from
photographs? How are they similar?

Answers

Satellite scanner images and photographs differ in terms of how they are captured and the perspective they provide. they similarities in their ability to visually represent the Earth's surface and their practical applications in different fields.

One key difference is the way they are captured. Satellite scanners capture images from space using sensors that detect and measure electromagnetic radiation emitted or reflected by objects on Earth's surface. On the other hand, photographs are captured by cameras that use lenses to focus visible light onto a photosensitive surface like film or a digital sensor.

Satellite scanners capture images from a top-down perspective, showing a wide area of the Earth's surface. This allows for a global or regional view, which is useful for mapping, monitoring weather patterns, and studying large-scale environmental changes. Photographs, on the other hand, are typically taken from ground level and provide a more localized and detailed view.

To know more about perspective visit:

https://brainly.com/question/11012390

#SPJ11

eco 321 sbu courshero compute the omitted variable bias that arises from the ols estimation of b1 from model 1

Answers

The omitted variable bias refers to the bias that arises in the Ordinary Least Squares (OLS) estimation of a coefficient when a relevant variable is not included in the regression model. In order to compute the omitted variable bias, you need to follow these steps:

1. Identify the relevant variable that is omitted from the regression model (Model 1). Let's call this variable X2.

2. Estimate the regression model with both X1 (the included variable) and X2 (the omitted variable). Let's call this Model 2.

3. Compute the difference between the coefficient estimate of X1 in Model 1 and Model 2. This difference represents the omitted variable bias.

4. Interpret the omitted variable bias. If the omitted variable bias is positive, it means that the estimated coefficient of X1 in Model 1 is too large. Conversely, if the omitted variable bias is negative, it means that the estimated coefficient of X1 in Model 1 is too small.

5. Consider the potential consequences of the omitted variable bias. Omitted variable bias can lead to incorrect inferences and flawed policy recommendations. It is important to identify and include all relevant variables in a regression model to avoid this bias.

By following these steps, you can compute the omitted variable bias and understand its implications in the OLS estimation of a coefficient.

To know more about regression visit:
https://brainly.com/question/32505018

#SPJ11

partially implements the top level of the single cycle processor. complete this code and ensure that

Answers

The statement mentions implementing the top level of the single cycle processor. To complete the code, you need to consider the key components of a single cycle processor. These components include instruction fetch, instruction decode, execution, memory access, and write back.

1. Instruction Fetch: This stage retrieves the instruction from memory using the program counter (PC) and stores it in the instruction register (IR).

2. Instruction Decode: The instruction in the IR is decoded to determine the operation to be performed and the operands involved.

3. Execution: This stage performs the arithmetic or logical operation specified by the instruction.

4. Memory Access: If the instruction involves accessing memory, this stage retrieves or stores data from or to the memory.

5. Write Back: The result of the execution stage is written back to a register or memory location, if necessary.

To complete the code, you will need to provide the specific implementation details for each stage. For example, you may use specific instructions like "lw" to load from memory or "add" to perform addition. The exact implementation will depend on the specific architecture and instruction set being used.

completing the code for the top level of a single cycle processor requires implementing the key stages of instruction fetch, instruction decode, execution, memory access, and write back. Each stage will have its own implementation details based on the desired functionality. This explanation provides a general overview of the steps involved in completing the code, and the specific implementation will depend on the architecture and instruction set.

To know more about key components , visit ;

https://brainly.com/question/33349572

#SPJ11

Event Scenario: You are planning an outdoor barbecue in a municipal park for 200 local/community residents from 4pm to 8pm on a weekend in the month of July. This event will include BBQ food items such as hamburgers, veggie burgers, and hotdogs, and alcohol will be served in a designated area of the park. In addition, this event will offer entertainment which will include musical performances for people of all ages and other activities for children. There will be some décor, a stage for the performers along with required AV equipment, tables and chairs, and local businesses will sponsor the event. This event will be marketed in the local newspaper and through social media. i. Include a list of expenses associated with this event. ii. Of the list of expenses identified, select 5 items and research the cost associated with each item. iii. Include the resource you sourced for the expense item. NOTE: You can present this in cha format. Event Scenario: You are planning an outdoor barbecue in a municipal park for 200 local/community residents from 4pm to 8pm on a weekend in the month of July. This event will include BBQ food items such as hamburgers, veggie burgers, and hotdogs, and alcohol will be served in a designated area of the park. In addition, this event will offer entertainment which will include musical performances for people of all ages and other activities for children. There will be some décor, a stage for the performers along with required AV equipment, tables and chairs, and local businesses will sponsor the event. This event will be marketed in the local newspaper and through social media. i. As the event planner, what would you do to find a suitable community park for this event? ii. Create a site inspection checklist for this event with a minimum of 10 items to consider and/or questions you would need to ask when conducting a site visit

Answers

Event planning involves many considerations, from cost estimations to finding the right venue.

Here are some potential expenses: Food and beverage costs, decor, stage and AV equipment, furniture rental, marketing, and entertainment. To find a suitable community park, one would need to assess the size, location, amenities, and any park policies or permit requirements.

When finding a suitable park, an event planner would research available community parks, their amenities, policies, and costs. They may consult local park authorities, visit the parks in person, or use online resources to gather necessary information. A site inspection checklist for this event may include items such as size of the park, availability on the desired date, suitability for a stage and AV setup, ease of access for attendees and suppliers, available amenities (like restrooms, power supply), safety considerations, alcohol permit requirements, and noise restrictions.

Learn more about Event Planning here:

https://brainly.com/question/30089885

#SPJ11

one additional feature of the list-based implementation of a union-find structure is that it allows for the contents of any set in a partition to be listed in time proportional to the size of the set. describe how this can be done.

Answers

In a list-based implementation of a union-find structure, one additional feature is the ability to list the contents of any set in a partition in time proportional to the size of the set.

To list the contents of a set, we iterate through the list or array corresponding to that set. Each element in the list/array represents an element of the set. By sequentially accessing these elements, we can obtain the contents of the set.

The time complexity of listing the contents of a set in this implementation is directly proportional to the size of the set. Since the list/array contains only the elements of the specific set, iterating through it provides a straightforward way to retrieve all the elements efficiently.

To know more about the list-based implementation click here: brainly.com/question/32610167

#SPJ11

question 7 a student writes a program that for any two lists l1 and l2, computes a list l3 that contains only the elements that are common between the two lists *without duplicates*. which following statement makes

Answers

To compute a list `l3` that contains only the elements common between lists `l1` and `l2` without duplicates, the student needs to iterate through each element in `l1` and check if it also exists in `l2`. If an element is found in both lists and is not already present in `l3`, it should be added to `l3`.

Here is an example of how the program could be implemented:

1. Initialize an empty list `l3`.
2. Iterate through each element `e` in `l1`.
3. Check if `e` exists in `l2` and if it is not already in `l3`.
4. If both conditions are met, add `e` to `l3`.
5. Repeat steps 2-4 for each element in `l1`.
6. After iterating through all elements in `l1`, `l3` will contain the common elements without duplicates.

For example:
```
l1 = [1, 2, 3, 4, 5]
l2 = [4, 5, 6, 7, 8]
l3 = []

# Iterating through l1
# Checking if 1 exists in l2 and if it's not already in l3 (add it)
# Checking if 2 exists in l2 and if it's not already in l3 (add it)
# Checking if 3 exists in l2 and if it's not already in l3 (add it)
# Checking if 4 exists in l2 and if it's not already in l3 (add it)
# Checking if 5 exists in l2 and if it's not already in l3 (add it)

l3 = [1, 2, 3, 4, 5]
```

The student should iterate through `l1` and check for common elements with `l2`. If a common element is found and is not already in `l3`, it should be added. The final result will be a list `l3` containing the common elements without duplicates. This explanation provides a step-by-step guide for the program.

To know more about program , visit ;

https://brainly.com/question/14454937

#SPJ11

How do you decide what new forms of content your brand needs?

Answers

Deciding on new forms of content for a brand involves a strategic approach and consideration of several factors:

Audience Analysis: Understanding your target audience is crucial. Conduct market research, analyze demographics, and gather insights to identify their preferences, interests, and content consumption habits. This helps determine the types of content that would resonate with them.

Content Goals: Define the objectives you want to achieve through your content. Whether it's increasing brand awareness, driving website traffic, generating leads, or providing value to customers, align your content forms with these goals.

Industry Trends: Stay updated on the latest trends and innovations in your industry. Monitor competitor content strategies and explore emerging content formats to ensure your brand stays relevant and competitive.

Content Audit: Evaluate your existing content to identify any gaps or areas that need improvement. Determine if there are content forms missing from your current repertoire that could enhance your overall content strategy.

Channel Selection: Consider the platforms and channels where your target audience is most active. Different content forms perform better on specific platforms, so choose formats that align with the channels you plan to leverage.

Resources and Capabilities: Assess your team's expertise, resources, and capabilities. Determine if you have the necessary skills and tools to create and deliver the desired content forms effectively. If not, consider outsourcing or upskilling to meet those requirements.

Testing and Iteration: Experiment with new content forms on a smaller scale to gauge their effectiveness. Analyze engagement metrics, feedback, and audience response to refine your content strategy and optimize for success.

To know more about consideration click the link below:

brainly.com/question/33639785

#SPJ11

the food and drug administration requires that all alcoholic beverages contain the same percentage of alcohol.

Answers

No, the Food and Drug Administration (FDA) does not require all alcoholic beverages to contain the same percentage of alcohol.


The percentage of alcohol in alcoholic beverages can vary widely depending on the type of beverage. For example, beer typically has an alcohol content of around 4-6%, while wine can range from 12-14%. Hard liquors like vodka or whiskey can have alcohol contents of 40% or higher.

The FDA does regulate the labeling of alcoholic beverages, requiring companies to accurately list the alcohol content on their products. This ensures that consumers are informed about the strength of the beverage they are consuming. However, there is no requirement for all alcoholic beverages to have the same percentage of alcohol.

The FDA does not mandate that all alcoholic beverages contain the same percentage of alcohol. The alcohol content can vary significantly depending on the type of beverage.

To know more about widely depending , visit ;

https://brainly.com/question/34080069

#SPJ11

as the increased use of regulation and ocmplaince i the information security arena expands, information security mangers must work to put tasks into perspective

Answers

With the growing emphasis on regulation and compliance in the information security field, information security managers need to prioritize and contextualize tasks effectively.

The field of information security has witnessed an increased focus on regulation and compliance due to the rising concerns about data breaches and privacy violations. Information security managers play a crucial role in ensuring that organizations meet the necessary regulatory requirements and adhere to compliance standards. In this context, it becomes essential for these managers to put tasks into perspective. This involves understanding the regulatory landscape, identifying the most critical compliance requirements, and prioritizing tasks accordingly.

By considering the potential risks and impact of non-compliance, information security managers can allocate resources effectively and implement appropriate security measures. Additionally, they must also balance regulatory demands with the organization's overall security strategy to achieve a comprehensive and risk-based approach to information security. Through effective task management and contextualization, information security managers can navigate the complex landscape of regulation and compliance while maintaining a robust security posture.

Learn more about security here: brainly.com/question/29659600

#SPJ11

write a program that reads both the girl's and boy's files into memory using a dictionary. the key should be the name and value should be a user defined object which is the count and rank of the name.

Answers

The program reads files containing names of girls and boys, storing them in memory using a dictionary. Each name is associated with a user-defined object that holds the count and rank of the name. The program facilitates easy access to name statistics, allowing for analysis and comparison.

To accomplish this task, the program follows these steps. First, it reads the girl's file and creates a dictionary object. Each name is assigned as a key, and the corresponding value is an object that holds the count and rank. The count represents the number of occurrences of that name, while the rank indicates its popularity relative to other names.

class NameData:

   def __init__(self, count, rank):

       self.count = count

       self.rank = rank

def read_names(file_path):

   names_dict = {}

   with open(file_path, 'r') as file:

       for line in file:

           name, count, rank = line.strip().split(',')

           name_data = NameData(int(count), int(rank))

           names_dict[name] = name_data

   return names_dict

def main():

   girls_file = 'girls.txt'  # Replace with your girls' file path

   boys_file = 'boys.txt'  # Replace with your boys' file path

   girls_names = read_names(girls_file)

   boys_names = read_names(boys_file)

   # Example usage: accessing name data by name

   name = 'Emma'

   if name in girls_names:

       girl_data = girls_names[name]

       print(f"Name: {name}, Count: {girl_data.count}, Rank: {girl_data.rank}")

   elif name in boys_names:

       boy_data = boys_names[name]

       print(f"Name: {name}, Count: {boy_data.count}, Rank: {boy_data.rank}")

   else:

       print(f"The name {name} is not found.")

if __name__ == '__main__':

   main()

In summary, the program reads the girl's and boy's files into memory using a dictionary, associating each name with a user-defined object containing count and rank information. This approach provides a convenient and efficient way to access and analyze name statistics.

To learn more about name statistics; -brainly.com/question/32751857

#SPJ11

Eller Software Services has received contract revenue information in a text file. You import, sort, and filter the data. You also create a PivotTable, prepare a worksheet with subtotals, and format related data as an Excel table.

[Student Learning Outcomes 4.1, 4.3, 4.4, 4.5, 4.6, 4.8]

Files Needed: EllerSoftware-04.xlsx (Available from the Start File link.) and EllerSoftwareText-04.txt (Available from the Resources link.)

Completed Project File Name: [your name]-EllerSoftware-04.xlsx

Skills Covered in This Project

Import a text file.

Use AutoFilters.

Sort data by multiple columns.

Create a PivotTable.

Format fields in a PivotTable.

Use the Subtotal command.

Format data in an Excel table.

Sort data in an Excel table.

This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

Open the EllerSoftware-04.xlsx start file. Click the Enable Editing button. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.

Import the EllerSoftwareText-04.txt file downloaded from the Resources link and load it to begin in cell A4. The text file is tab-delimited.

Format the values in column H as Currency with zero decimal places.

Click cell G4 and use the AutoFilter arrow to sort by date oldest to newest.

Click cell F4 and use the AutoFilter arrow to sort by product/service name in ascending order.

Filter the Date column to show only contracts for September using the All Dates in the Period option.

Edit the label in cell A2 to display Contract Amounts for September.

Select cells A1:H2 and press Ctrl+1 to open the Format Cells dialog box. On the Alignment tab, choose Center Across Selection.

Change the font size for cells A1:H2 to 20 pt (Figure 4-102) and close the Queries & Connections pane.

Figure 4-102 Imported data sorted and filtered

Copy the Contracts sheet to the end and name the copy Data.

Clear the date filter.

Select cell A5 and click the PivotTable button [Insert tab, Tables group]. The range is identified as the EllerSoftwareText file.

Verify that New Worksheet is selected, deselect the Add this data to the Data Model button, and click OK.

Name the sheet PivotTable. Close the Queries & Connections pane.

Show the Product/Service and Contract fields in the PivotTable.

Drag the Contract field from the Choose fields to add to report area below the Sum of Contract field in the Values area so that it appears twice in the report layout and the pane (Figure 4-103).

Figure 4-103 "Contract" field appears twice in the report

Select cell C4 and click the Field Settings button [PivotTable Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.
Select cell C4 and click the Field Settings button [PivotTable Tools Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.

Select cell B4 and set its Custom Name to Total Contracts and the number format to Currency with zero decimal places.

Apply Brown, Pivot Style Dark 3.

Select the Data sheet tab and copy cells A1:A2. Paste them in cell A1 on the PivotTable sheet.

Select Align Left for cells A1:A2 and 16 pt. as the font size. Edit the label in cell A2 to display Contract Amounts, September through December (Figure 4-104).

Figure 4-104 Completed PivotTable

Copy the Data sheet to the end and name the copy Subtotals.

Select cell D5 and sort by City in A to Z order.

Select cell A5 and convert the table to a range. Select cells A5:H31 and apply No Fill [Home tab, Font group].

Use the Subtotal command to show a SUM for the contract amounts for each city.

Edit the label in cell A2 to display Contract Amounts by City.

Format the sheet to Landscape orientation, center the page vertically, and scale it to fit one page.

Click the Billable Hours sheet tab and select cell A4.

Click the Format as Table button [Home tab, Styles group], use Orange, Table Style Medium 10, and remove the data connections.

Type 5% Add On in cell E4 and press Enter.

Build a formula in cell E5 to multiply cell D5 by 105% and press Enter to copy the formula.

Select cells A1:A2 and left align them. Then select cells A1:E2, click the Launcher for the Alignment group [Home tab], and select Center Across Selection from the Horizontal list.

Use the AutoFilter arrows to sort by date in oldest to newest order.

Save and close the workbook (Figure 4-105).

Figure 4-105 Excel 4-4 completed

Upload and save your project file.

Submit project for grading.

Answers

We can see here that the steps you need to follow to accomplish the tasks in Excel are:

1. Open the EllerSoftware-04.xlsx file.

2. Import the EllerSoftwareText-04.txt file by going to the Data tab, selecting "Get External Data," and choosing "From Text." Locate the EllerSoftwareText-04.txt file and select it. Make sure to choose the option for tab-delimited data during the import process.

What are the steps?

3. Format the values in column H as Currency with zero decimal places by selecting column H, right-clicking, choosing "Format Cells," and selecting the Currency format with zero decimal places.

4.  Sort the data by date oldest to newest by clicking on the AutoFilter arrow in cell G4 and selecting the appropriate sorting option.

5. Sort the data by product/service name in ascending order by clicking on the AutoFilter arrow in cell F4 and selecting the appropriate sorting option.

6.  Filter the Date column to show only contracts for September by clicking on the AutoFilter arrow in the Date column (cell A4), unchecking the "Select All" option, and checking the box for September.

7.  Edit the label in cell A2 to display "Contract Amounts for September."

8. Select cells A1:H2, right-click, choose "Format Cells," go to the Alignment tab, choose "Center Across Selection," and click OK.

9. Change the font size for cells A1:H2 to 20 pt by selecting the cells, right-clicking, choosing "Format Cells," going to the Font tab, selecting the desired font size, and clicking OK.

10. Copy the Contracts sheet to the end by right-clicking on the Contracts sheet tab, selecting "Move or Copy," choosing "(move to end)" in the "Before sheet" section, and clicking OK.

11. Clear the date filter by clicking on the AutoFilter arrow in the Date column (cell A4) and selecting the "Clear Filter" option.

12. Select cell A5 and click the PivotTable button in the Insert tab. In the Create PivotTable dialog box, make sure the range is correct and choose the option to create the PivotTable on a new worksheet. Deselect the "Add this data to the Data Model" button and click OK.

13. Name the new sheet "PivotTable" and close the Queries & Connections pane.

14. Show the Product/Service and Contract fields in the PivotTable by checking the respective boxes in the Field List pane.

15. Drag the Contract field from the Field List pane to the "Values" area in the PivotTable twice.

16. Select cell C4 in the PivotTable, click the Field Settings button in the PivotTable Analyze tab, set the Custom Name to "Average Contract," choose "Average" as the calculation, and set the Number Format to "Currency" with zero decimal places.

17. Select cell B4 in the PivotTable, click the Field Settings button in the PivotTable Analyze tab, set the Custom Name to "Total Contracts," and set the Number Format to "Currency" with zero decimal places.

18. Apply the "Brown, Pivot Style Dark 3" to the PivotTable by selecting it from the PivotTable Styles gallery.

19. Copy cells A1:A2 from the Data sheet, go to the PivotTable sheet, and paste them in cell A1. Select the pasted cells (A1:A2), align them left, and set the font size to 16 pt.

20. Edit the label in cell A2

Learn more about PivotTable on https://brainly.com/question/27813971

#SPJ1

Which of the following is an accuracy issue?

a. How should we handle illegally copying copyrighted software?

b. What information about oneself should an individual be required to reveal to others?

c. How can we ensure that the information will be processed properly and presented accurately to users?

d. What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Answers

The accuracy issue among the given options is:

c. How can we ensure that the information will be processed properly and presented accurately to users?

The question raises concerns about ensuring accurate processing and presentation of information to users. Accuracy issues can arise when there are errors, biases, or distortions in the way information is processed, analyzed, and presented. In this context, accuracy refers to the correctness and reliability of the information being provided to users. Ensuring accuracy is crucial in various domains, such as data analysis, journalism, research, and decision-making processes. It involves implementing rigorous methodologies, fact-checking procedures, and quality control measures to minimize errors and biases. Additionally, transparency in data collection and processing methods is essential for building trust and confidence among users.

Ensuring the accuracy of information is a critical concern in today's digital age. The rapid dissemination of information through various channels, including social media and online platforms, has made it challenging to verify the authenticity and reliability of the data. Inaccurate information can have far-reaching consequences, impacting individual decisions, public perception, and even the functioning of organizations or institutions. To address this issue, there is a growing emphasis on fact-checking initiatives, data validation techniques, and algorithmic transparency. Furthermore, responsible information dissemination involves educating users about critical thinking skills, media literacy, and evaluating the credibility of sources. By fostering a culture of accuracy and promoting ethical practices, we can mitigate the negative effects of misinformation and ensure that users receive reliable and truthful information.

Learn more about processing here:
brainly.com/question/14654945

#SPJ11

When creating a new user in microsoft azure, how is the initial password determined?

Answers

When creating a new user in Microsoft Azure, the initial password is determined based on the password policy set by the Azure administrator.

The password policy specifies the complexity requirements for passwords, such as minimum length, the use of uppercase and lowercase letters, numbers, and special characters.

Azure generates a random password that meets the password policy requirements. This initial password is then provided to the user who is creating the new account. The user can change this initial password to a more secure and memorable password after the account is created.

The initial password for a new user in Microsoft Azure is determined by Azure itself, based on the password policy set by the Azure administrator. The user can then change this password to a more secure one.

To know more about Microsoft , visit ;

https://brainly.com/question/2704239

#SPJ11

is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.

Answers

This type of attack is commonly known as "social engineering" or "voice phishing," where a hacker impersonates an authoritative figure to manipulate and extract information from a user.

In social engineering attacks conducted over the phone, the hacker typically adopts a persona of someone in a position of authority, such as a company executive, IT support personnel, or a trusted individual. By leveraging this false identity, the hacker aims to gain the victim's trust and exploit their willingness to comply with requests.

The attacker uses various psychological tactics to gradually draw out sensitive information from the user. They may employ techniques such as building rapport, creating a sense of urgency or fear, and exploiting human vulnerabilities like trust and helpfulness. The ultimate goal is to obtain confidential data, such as passwords, account details, or personal information that can be used for malicious purposes like identity theft or unauthorized access.

It is important to remain vigilant and cautious when receiving unsolicited phone calls, especially from individuals requesting sensitive information. Verifying the identity of the caller by using trusted contact information or reaching out to the supposed authority figure independently can help mitigate the risk of falling victim to social engineering attacks. Additionally, organizations can implement awareness programs and security measures to educate employees and protect against these types of threats.

Learn more about hacker here:

brainly.com/question/32413644

#SPJ11

effect of fructose on body weight in controlled feeding trials: a systematic review and meta-analysis.

Answers

In controlled feeding trials, a systematic review and meta-analysis have been conducted to examine the effect of fructose on body weight.

The analysis revealed that there is no significant difference in body weight between individuals consuming fructose and those consuming other sources of calories.

However, it is important to note that this conclusion is based on controlled feeding trials and may not accurately reflect real-world conditions.

Additionally, the amount of fructose consumed and other factors such as overall calorie intake, physical activity, and individual metabolic differences can also influence body weight.

Therefore, while fructose may not directly lead to weight gain in controlled feeding trials, it is still advisable to consume it in moderation as part of a balanced diet.

To know more about meta - analysis , visit ;

https://brainly.com/question/31678384

#SPJ11

Answer the following questions regarding system requirements: a) Is it important to prioritize system requirements, and if so, when should the system requirements be prioritized? b) What is one techni

Answers

Yes, prioritizing system requirements is important. System requirements should be prioritized during the initial stages of the project, before design and development begin.

Prioritizing system requirements is crucial for project success. By establishing priorities early on, stakeholders can align their expectations, make informed decisions, and allocate resources effectively. Prioritization should ideally occur during the project's initiation and planning phases, before design and development activities commence. This allows for a clear understanding of essential features and functionalities, ensuring that critical requirements are addressed first. Prioritization also helps manage project scope and mitigate risks by identifying potential trade-offs or compromises. Regularly revisiting and updating system requirements throughout the project lifecycle is essential to adapt to changing needs and priorities.

To know more about project click the link below:

brainly.com/question/31710748

#SPJ11

Write a python program to input the reynolds number and the roughness factor/diameter ratio from a file

Answers

To write a Python program that inputs the Reynolds number and the roughness factor/diameter ratio from a file, you can follow these steps:

1. Start by opening the file using the `open()` function and specify the file path.
2. Read the content of the file using the `readline()` or `readlines()` method, depending on whether the values are on a single line or multiple lines.
3. Store the read values into variables, assuming the Reynolds number is stored in a variable called `reynolds_number` and the roughness factor/diameter ratio is stored in a variable called `roughness_ratio`.
4. Perform any necessary calculations or operations using these values.
5. Close the file using the `close()` method.

Here's an example code snippet that demonstrates this:

```python
# Open the file
file_path = "path_to_file.txt"  # Replace with the actual file path
file = open(file_path, "r")

# Read the content and store values into variables
reynolds_number = float(file.readline())
roughness_ratio = float(file.readline())

# Perform calculations or operations using the values
# For example:
result = reynolds_number * roughness_ratio

# Close the file
file.close()
```

Make sure to replace `"path_to_file.txt"` with the actual file path where the Reynolds number and roughness factor/diameter ratio are stored. Additionally, you can modify the calculations or operations according to your requirements.

To know more about Python program visit:

https://brainly.com/question/32674011

#SPJ11

Assume the porous medium is filled with water, and fully connected to the left and right boundary at the indicated boundaries. To simplify, we can assume that the porous medium stretches a half grid block into the two reservoirs where the connections are indicated.
a) Set up the linear equations describing this system.
b) We want to solve the system of equations using matrix form, Ap =b. Set up the matrix A and vector b in Python.
c) Solve for the pressure field p, and plot the resulting pressure field.
d) Solve for the pressure using the Gauss-Seidel relaxation method, with relaxation parameter α=1 and using 10 iterations. Plot the resulting pressure field.
e) Compare the solution with the implicit method above. Assuming the implicit method gives the correct answer, what is the error when using 10 and 100 iterations.
f) Use the Gauss-Seidel relaxation method with relaxation parameter α=1.8. How does the change in α value affect the error?
g) Calculate the fluid flow from the right to the left reservoir.

Answers

The problem involves setting up linear equations to describe a system of fluid flow in a porous medium. The equations will be solved using matrix form, and the resulting pressure field will be plotted. The Gauss-Seidel relaxation method will also be applied with different parameters to observe the effect on the solution and error. The fluid flow from the right to the left reservoir will be calculated.

a) The linear equations can be set up based on the flow properties of the porous medium and the boundary conditions. These equations will represent the pressure distribution within the system.

b) In Python, the matrix A and vector b can be defined based on the linear equations obtained in part (a). Matrix A will contain the coefficients of the pressure variables, and vector b will contain the right-hand side values.

c) Solving the system of equations using matrix form will give the pressure field, which can be plotted to visualize the distribution of pressures within the porous medium.

d) Applying the Gauss-Seidel relaxation method with a relaxation parameter of α=1 and performing 10 iterations will provide an approximation of the pressure field. The resulting field can be plotted.

e) Comparing the solution obtained using the implicit method with the Gauss-Seidel method, the error can be calculated by comparing the pressure values at corresponding grid points. The error for 10 and 100 iterations can be determined.

f) Using the Gauss-Seidel relaxation method with a different relaxation parameter, such as α=1.8, will yield a different pressure field. By comparing the error with the previous case, the effect of changing the α value on the error can be observed.

g) The fluid flow from the right to the left reservoir can be calculated based on the pressure gradient and the properties of the porous medium.

It is important to note that providing a detailed step-by-step solution, including Python code and plot generation, is beyond the scope of a text-based response. This problem typically requires a numerical implementation and visualization in a programming environment to obtain the desired solutions and analyze the results.

Learn more about Python here: https://brainly.com/question/30427047

#SPJ11

Sutherland Company listed the following data for the current yoar:
Budgeted factory overhead #2,214,000
Budgeted direct labor hours $90.000
Budgeted machine hours $45,000
Actual factory overhead $2,201,700
Actual direct labor hours $84,000
Actual machine hours $43,000

If overhead is applied based on machine hours, the over applied under applied
Multiple Choice
a. $86,100 underapplied
b. $86.100 overapplied
c. $68.052 underapplied
d. $68.052 overapplied

Answers

Based on the given data, if overhead is applied based on machine hours, the company will have overapplied overhead of $68,052.

To determine whether overhead is overapplied or underapplied, we need to compare the actual overhead with the applied overhead. The applied overhead is calculated by multiplying the actual machine hours by the predetermined overhead rate.

Predetermined overhead rate = Budgeted factory overhead / Budgeted machine hours

Predetermined overhead rate = $2,214,000 / $45,000 = $49.2000 per machine hour

Applied overhead = Predetermined overhead rate * Actual machine hours

Applied overhead = $49.2000 * 43,000 = $2,118,600

To calculate whether overhead is overapplied or underapplied, we subtract the actual overhead from the applied overhead.

Overapplied overhead = Applied overhead - Actual overhead

Overapplied overhead = $2,118,600 - $2,201,700 = -$83,100

Since the result is negative, it means that overhead is overapplied. However, the options provided in the multiple-choice question do not include a negative value. To obtain the absolute value, we take the absolute value of -$83,100, which is $83,100. However, none of the options provided match this value.

Therefore, based on the calculation, the correct answer is not provided in the given options.

Learn more about Budgeted here:

https://brainly.com/question/31952035

#SPJ11

Other Questions
Eastern time focusWestern time focusPresent time focusQuestion 4 (2 points)Which of the following is a characteristic of low-context culture?Efficiency and speed are valuedTeamwork is preferredExcellence and completeness are valuedNonverbal elements are important According to Black and Gregersen, which action is essential to overcome barriers to change? the market reaction to analyst stock recommendation and earnings forecast consistency: international evidence. If Holly wants to earn interest of $3,556.25 on her $20,000.00savings in 4 years, at what nominal interest rate compoundedquarterly do you suggest she invests her money? % Round to twodecimal place Use the first principle to determine the derivative of : g(x)= 23x 1 The ages of people visiting a senior center one afternoon are recorded in the line plot.A line plot titled Ages At Senior Center. The horizontal line is numbered in units of 5 from 60 to 115. There is one dot above 80 and 110. There are two dots above 70 and 85. There are three dots above 75.Does the data contain an outlier? If so, explain its meaning in this situation. No, there is no outlier. This means that the people were all the same age. No, there is no outlier. This means that the people are all around the mean age. Yes, there is an outlier at 110. This means that one person's age was 110, which is 25 years older than the next closest age. Yes, there is an outlier of 110. This means that the average person at the center is 110 years old. Describe an experiment to investigate whether lightly rubbing a dry polythene rod produces only a small charge where as rubbing it more often and more quicky produces a greater charge Is the colorless gas hydrogen reacts explosively when ignited in air a physical or chemical property? The Underhill Company purchases tennis rackets from a supplier for $85 each and then sells them to its customers for $125 each. The company forecasted unit sales of Ending inventory for January was 200 units and the company wants budgeted ending inventory to be 20% of the following month's forecasted sales. The company also Module 6 Textbook Problem 1 Learning Objective: 6-1 Identify the characteristics of relevant information Solomon Company makes fine jewelry that it sells to department stores throughout the United States. Solomon is trying to decide which of the two bracelets to manufacture. Cost data pertaining to the two choices follow. Bracelet A Bracelet Cost of materials per unit 32 $ 43 Cost of labor per unit Advertising cost per year 9,880 6,600 Annual depreciation on existing equipment 6,480 $ 43 43 4,100 Required a. Identify the fixed costs and determine the amount of fixed cost for each product. b. Identify the variable costs and determind the amount of variable cost per unit for each product c. Identify the avoidable costs and determine the amount of avoidable cost for each product Complete this question by entering your answers in the tabs below. Required A Required B Required Identify the fixed costs and determine the amount of fixed cost for each product. Fixed Costs Bracelet A Bracelet B Total fixed costs S 0 $ Identify the variable costs and determine the amount of variable cost per unit for each product. Variable Costs Bracelet A Bracelet B Total variable costs per unit $ 0 $ 0 Identify the avoidable costs and determine the amount of avoidable cost for each product. Avoidable Costs Bracelet A Bracelet B What is meant by "liquidity"?A how quickly an asset is converted into cashB how quickly an asset is converted into cash and the ability of a firm to meet its short-term liabilitiesC the ability of capital to generate profitD the ability of a firm to meet its short-term liabilitiesQuestion 29Current Assets minus Current liabilities is calledA Short term assetsB Working CapitalC Short term liabilitiesD Net Capital Give a detailed explanation of the requirements (collegedegrees, relevant experience, and certificates for sports writing)in one paragraph." Q5. Unemployment & output. A country has 10 percent unemployment. The production function is Cobb-Douglas with =.. (a) By how much will production increase if unemployment is reduced to 5 percent while the capital stock, the labour force, and technology are unchanged? Explain your result. (b) If unemployment remains permanently on the lower level, is it likely that the capital stock will remain unchanged? (c) Describe what happens to (i) output per capita and (ii) output per worker in the short term and the long term. 1) The president of Mighty Soft software company is about to introduce a new computer operating system called Roorknobs. Because it is easier to swap files with people who have the same operating system, the amount people are willing to pay to have Roorknobs on their computers is greater the larger they believe Roorknobs's market share to be. The perceived market share for Roorknobs is the fraction of all computers that the public believes is using Roorknobs. When the price of Deorknebs is p, then its actual market share is the fraction of all computer owners that would be willing to pay at least $p to have DoorKnobs installed on their computers. Market researchers have discovered that if Roorknobs's perceived market share is s and the price of Roorknobs is $p, then its actual market share will be x, where x is related to the price p and perceived market share s by the formula p=256s(1x) In the short run, Mighty Soft can influence the perceived market share of Roorknobs by publicity, advertising, giving liquor and gifts to friendly journalists, and giving away copies in conspicuous ways. In the long run, the truth will emerge, and Roorknobs'sperceived market share s must equal its actual market share x. (a) If the perceived market share is s, then the demand curve for Doorknobs is given by Equation (1). Draw the demand curve relating price to actual market share in the case in which QoorKnobs's perceived market share is s=1/2. Label this curve s=1/2 (b) On the demand curve that you just drew with s=1/2, mark a dot on the point at which the actual market share of Doorknobs is 1/2. What is the price at which half of the computer owners actually want to buy Reorknobs, given that everybody believes that half of all computer owners want to buy Reorknebs? (c) On the same graph, draw and label a separate demand curve for the case where Roorknobs's perceived market share s takes on each of the following values: s=1/8,1/4,3/4,7/8,1. (d) On the demand curve for a perceived market share of s=1/4, put a dot on the point at which the actual market share of Roorknobs is 1/4. If the perceived market share of Roerknobs is 1/4, at what price is the actual market share of Roorknobs also 1/4 ? Find all the first order partial derivatives for the following function. f(x,y,z)=xzx+y a. xf=z(x+y+2x+yx)yf=2x+yxy;zf =xx+y b. xf=z(x+yx+yx)yf=x+yxy;zf =xx+y c. xf=z(x+y+x+yx)yf=x+yxy;zf= xx+y d. xf=2(x+y2x+yx)yf=2x+yxy; zf=xx+y what is the symbolic significance of mr. wright killing mrs. wrights bird? the bird represents mrs. wrights singing ability; mr. wright suppressed his wifes ambitions to sing professionally. the bird represents mrs. wrights role as a mother; mr. wright killed his wifes desire to have children. the bird represents peace; mr. wright destroyed the peace of the household by constantly fighting with his wife. the bird represents mrs. wright when she was young and happy; mr. wright destroyed his wifes joyful spirit. A town's recreation department is trying to decide how to use a piece of land. One option is to put up basketball courts with an expected life of 8 years. Another is to install a swimming pool with an expected life of 24 years. The basketball court would cost $180.000 to construct and yield net benefits of $40,000 at the end of each of the 8 years. The swimming pool would cost $2.25 million to construct and yield net benefits of 8170,000 at the end of each of the 24 years. Each project is assumed to have zero salvage value at the end of its life. Using a real discount rate of 5 percent, which project offers larger net benefits? The balance on the plant and machinery account at cost on January201was10,000. On 1 May plant costing1,500was sold. New machinery costing6,000was purchased on 1 September. Depreciation is charged, month-by-month, on a straight-line basis at10%per annum and amounts for the year ended 31 December20X1to: (a)1,250(b)1,100(c)1,050(d)1,200 The financial aspects and sensitivity study of the Ba Kelalanproject for each of the following cases: 1. Baseline case 2.Variation in efficiency 3. Variation in flow adjustment 4. Debtratio case One way to encrypt words is by translating them into sequences of numbers and then encrypting the numbers by converting them to different numbers by reducing mod an integer, then translating back to letters. Encrypt the message " HALT " by translating the letters into numbers (via A=0,B=1,C=2,D=3,E=4,F=5,G=6,H=7,I=8, J=9,K=10,L=11,M=12,N=13,O=14,P=15,Q=16,R=17, S=18,T=19,U=20,V=21,W=22,X=23,Y=24,Z=25 ) and then applying the encryption function given, and then translating the numbers back into letters. Hint: Your answers should be strings of letters. (a) f(p)=(p+2)mod26 (b) f(p)=(p+11)mod26 (c) f(p)=(p+7)mod26