classroom(building, room_number, capacity) department(dept_name, building, budget) course(course_id, title, dept_name, credits) instructor(ID, name, dept_name, salary) section(course_id, sec_id, semester, year, building, room_number, time_slot_id) teaches(ID, course_id, sec_id, semester, year) student(ID, name, dept_name, tot_cred) takes(ID, course_id, sec_id, semester, year, grade) advisor(s_ID, i_ID) time_slot(time_slot_id, day, start_time, end_time) prereq(course_id, prerequid) Figure 2.9 Schema of the university database.

Answers

Answer 1

The schema of the university database shown in Figure 2.9 includes several tables that represent different aspects of the university's operations, such as classrooms, departments, courses, instructors, students, and advisors.  

This is the schema of the university database. It consists of the following tables:


  

Classroom (building, room_number, capacity)  Department (dept_name, building, budget)   Course (course_id, title, dept_name, credits) Instructor (ID, name, dept_name, salary)Section (course_id, sec_id, semester, year, building, room_number, time_slot_id)  Teaches (ID, course_id, sec_id, semester, year)Student (ID, name, dept_name, tot_cred)Takes (ID, course_id, sec_id, semester, year, grade)Advisor (s_ID, i_ID)Time_slot (time_slot_id, day, start_time, end_time) Prereq (course_id, prerequid)

This schema provides information about the buildings, courses, instructors, sections, students, and time slots at a university. It also provides information about the department's budgets, the courses' prerequisites, and the advisors of the students.

In summary, the university database schema provides a comprehensive structure for organizing and storing information about the university's various operations. The relationships between the tables enable the retrieval of relevant information and the analysis of the data in meaningful ways.

To know more about the database schema click here:

https://brainly.com/question/17216999

#SPJ11


Related Questions

In the program below, what is the scope of strFirst?

def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]

def passwordMaker (strA, numC):
if len(strA) > 4:
answer = dogName[0:3]
return answer + str(numC)
else:
return 'xk&' + str(numC)


options

the function usernameMaker

the function passwordMaker and the main part of the program that calls the function

the function usernameMaker and the main part of the program calling the program

the function passwordMaker

Answers

First, we have to understand what scope is. When variables are declared, they are only available in the code block they're declared in, unless they're global variables (this doesn't apply here).

strFirst is declared in usernameMaker and that is the only place it is available in.

The scope of a variable is the area where the variable can be accessed.

The scope of strFirst is (a) the function usernameMaker

From the program, we have the following function header

def usernameMaker (strFirst, strLast):

The above header implies that:

strFirst is a local variable of the function usernameMaker

This means that, the scope of strFirst is limited to the function usernameMaker

Hence, the correct option is (a)

Read more about scope of variables at:

https://brainly.com/question/20058399

can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?

Answers

Answer:

Yes

Explanation:

0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.

Which of the following is a responsibility of the hardware? (1 point)
O processing
O runtime prioritization
O memory allocation
O managing hardware

Answers

The option that is a responsibility of the hardware is option a: processing​.

What is a hardware in a computer?

Hardware is known to be a term that is seen as  the computer's tangible parts or its delivery systems.

It is one that helps in processing as well as saves or store and run the written instructions that is known to be given  by the software.

Therefore, based on the above, The option that is a responsibility of the hardware is option a: processing​.

Learn more about hardware  from

https://brainly.com/question/24370161

#SPJ1

Which three phrases describe a wireframe?
Tracy uses a pictorial summary of an entire website in her team meeting. It is a two-dimensional illustration of how each web page on a website will look. Known as a workflow diagram, this explains how pages in a website connect to one another. It is a design tool, and it shows the overall framework of a website. It is a visual representation of how much space each element on a page should take.

Answers

Answer:

A wireframe is best described by the phrase;

It is a design tool, and it shows the overall framework of a website

Explanation:

A wireframe is meant to provide a visualization for a page in a form of blue print that defines a websites structure thereby aiding the communication and thought process among those concerned in the website development process, including the programmers, developers and website designers

The wireframe is a depiction of the website, that points out the intended location of content, the layout and how navigation and functions that are to be included on a page in a way that is easily adjustable

The wireframe is therefore a representation of the skeletal framework of the website

Answer:

i only know two and they are design tool and shows the overall frame work of a website

Explanation:

plato

At which of the capability maturity model integration maturity levels, are processes well defined, understood, and consistent across the organization?.

Answers

At defined (quantitatively managed), the capability maturity model integration maturity levels, are processes well defined, understood, and consistent across the organization.

An organization's software development process can be developed and improved using the Capability Maturity Model (CMM). The model outlines a five-level evolutionary path of processes that get more ordered and systematic as they mature.

The Software Engineering Institute (SEI), a research and development facility supported by the U.S. Department of Defense (DOD) and now a part of Carnegie Mellon University, developed and promotes CMM. In order to address software engineering difficulties and, generally speaking, develop software engineering approaches, SEI was established in 1984.

More specifically, SEI was created to streamline the DOD's software-intensive system development, acquisition, and maintenance processes. SEI supports the widespread industrial use of CMM Integration (CMMI), a development of CMM. Additionally, the capability maturity model is still commonly employed.

CMM is comparable to ISO 9001, one of the International Organization for Standardization's ISO 9000 set of standards. The ISO 9000 standards outline an efficient quality system for the manufacturing and service sectors; ISO 9001 explicitly addresses the creation and upkeep of software.

To know more about  Capability Maturity Model click on the link:

https://brainly.com/question/14595603

#SPJ4

Please give me podcast ideas. For school I have to make a podcast for a competition and I have no clue what it should be about. Please make it school appropriate.

Answers

Answer: I think a podcast about growing up/changes, common struggles that people might not address, a type of motivational talk/speech(that's like really deep and puts a different perspective on life). You could do something about being a gen-z(including a comedic twist), maybe create a lighter mood on some current evens.

Some other ideas:

- the history/ journey of a tv show or movie

- biography of someone who was forgotten in history

-bucket list challenge

- growth challenge(could include getting better grades, becoming a better person, like personal growth stuff)

That is pretty much it.

Explanation:

for two tables to be related, they must share a common field.T/F

Answers

True. For two tables to be related, they must share a common field. This means that there needs to be a shared piece of information that exists in both tables which links them together.

For example, if one table contains information about customer orders and another table contains information about customer details, the two tables could be related by a shared customer ID field. This allows information from both tables to be linked together and accessed in a meaningful way. Without a common field, the two tables would not have any way to be connected and any attempts to combine or compare information from the tables would be impossible. Therefore, it is crucial for related tables to share a common field.

learn more about tables to be related here:
https://brainly.com/question/30883400

#SPJ11

Input/output devices provide data and instructions to the computer and receive results from it.
a. True
b. False

Answers

The computer receives data and instructions from true input/output devices, which also deliver results.

What system is utilised to receive information or commands from the user?

Devices known as input devices provide data to a computer so it can carry out a task. Data and instructions are entered into a computer via input devices such a keyboard, mouse, light pen, etc.

How do input and output devices function in a computer system?

Computer input and output devices: An output device is a device that receives data from a computer system and then reproduces or displays the results of that processing, whereas an input device is a device that delivers data to a computer system for processing.

To know more about input/output visit:-

https://brainly.com/question/30160104

#SPJ1

model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Answers

According to the social convoy theory of social relationships, people live their lives as part of a personal network of people to whom they provide support and from whom they receive it.

What is the meaning of social convoy?

The people that travel with us on the road of life are referred to as the social convoy. At every stage of development, this social grouping is a crucial component of successful adjustment and wellbeing.

As one matures and develops, they rely on these interactions and connections because all are social beings. Social convoy is a network of friends that travel through life with us and support us through both good and difficult times.

Learn more about social convoy from here:

https://brainly.com/question/7318152

#SPJ1

The complete question has been attached in text form:

In the social ______ model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Discuss two business information systems that are used in two different sectors in a modern economy.

Answers

Explanation:

Two business information systems that are used in two different sectors in a modern economy are:

Transaction Processing System (TPS):

The Transaction Processing System (TPS) is a type of data system for capturing, storing, updating and recovering a company's data operations. Transaction systems often try to provide consistent response times to requests even if this is not as important as in real-time systems.

Management Information System (MIS)

MIS is the study of persons, technological systems and associations between them. Management Information Systems (MIS) Professionals at MIS allow businesses to profit maximally from staff, facilities and business process expenditure. MIS is a field of people with a focus on technological support.

PLZ PLZ PLZ PLZ HELP will mark brainlist What component contains the ROM (Read Only Memory)?

CPU

RAM

Motherboard

Storage

Answers

motherboard hope it helps :))

Other than hard discs and flash discs, identify other three different storage media

Answers

Answer:

A storage media is any media that can store data.

1. USB flash memory

2. Memory stick

3. Floppy disk

how to compute one sided inverses of non square matrices

Answers

Answer:

(Transpose(A) A)X=Transpose(A)B

Explanation:

If the purpose of inverting the non-square matrix A is to solve a system of linear equations like Ax=B then you can multiply both sides of the matrix equation by the transpose of A so that it becomes (Transpose(A) A)X=Transpose(A)B. You can now invert Transpose (A) A and thus solve the system of equations

List at least 5 features that can be used to format a report.

Answers

Answer:

Following are the features for formatting a report in word 2013

Design Tab

Convenient Layout options and alignment

Resume work option

Managing longer documents in a better way

Enhanced table features

Explanation:

In word 2013, many of the new features were introduced:

The design tab was given a new look, including templates options and much more.

The layout option was also made much convenient by putting all necessary option under the right-click option.

Word started to present an option for resuming the work were you left last time. This made the working much efficient.

By dealing with headings the word 2013 version made it easier to compact the document by collapsing heading and focus on the specific part you want.

Many of the options were added to tables formatting such as border, colors, line weight and much more.

Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
A.
popular pizza chains in the world
B.
most popular AND pizza chains AND worldwide AND 2019
C.
the most popular pizzas “in the world today” AND 2019 AND chains
D.
2019 worldwide pizza chains “most popular in the world”

Answers

D I believe is correct

Answer:

D

Explanation:

Tech expert help!!! 69 points (since I want to have an even number of points on my profile) But that aside, I need help! SO, If I wanted to, say "Play a mod to a game", BUT It's a renpy 7 mod, and whenever I try to import it, an error appears. Can I fix this myself or do I need professional help?

Answers

If you are experiencing errors while trying to import a mod for a game, it is possible that there is an issue and depending on the nature of the error, you may be able to fix it yourself or you may need professional help.

Few steps you can try to troubleshoot the issue:

Check the mod requirements: Make sure that you have all the necessary files and software to run the mod. Check the mod documentation for any specific requirements or dependencies.

Update the game: Make sure that you have the latest version of the game installed. Some mods may require specific versions of the game to work properly.

Check for conflicts: Make sure that the mod is compatible with any other mods you have installed. Some mods may conflict with each other, causing errors or crashes.

Check for updates: Check to see if there are any updates available for the mod. The mod may have been updated to fix any issues or bugs.

If you have tried these steps and are still experiencing errors, it may be best to seek professional help. You can try reaching out to the mod creator or the game developer for support, or you can seek assistance from a professional computer technician.

Read more about game developers here:

https://brainly.com/question/3863314

#SPJ1

Which of the following is usually bundled as a hidden component of a freeware?

Botnet
Logic bomb
Spyware
Polymorphic malware
Armored virus

Answers

Answer:

Spyware is usually bundled as a hidden component of freeware.

Explanation:

Spyware is a type of malware that is designed to collect information about a user's online activities without their knowledge or consent. It can track browsing history, capture keystrokes, and steal sensitive personal information, such as passwords and financial information. Spyware is often bundled with freeware, which is software that is available for free but may include additional components that are hidden or difficult to remove. Other common types of malware include botnets, logic bombs, polymorphic malware, and armored viruses.

What is one example of a servant leader behavior pattern?
- Understands and empathizes with others
- Focuses on individual task metrics
- Thinks about the day-to-day activities
- Uses authority rather than persuasion when necessary

Answers

One example of a servant leader behavior pattern is the ability to A. understand and empathize with others.

Servant leaders prioritize understanding and empathizing with others. They actively listen to their team members, seek to understand their needs, challenges, and aspirations, and show genuine empathy toward them.

They put themselves in others' shoes to gain insight into their perspectives, emotions, and experiences. This understanding and empathy enable servant leaders to support their team members effectively, address their concerns, and provide the necessary guidance and resources for their success.

By focusing on understanding and empathizing with others, servant leaders foster a supportive and collaborative work environment that promotes individual growth and collective achievement.

Learn more about  servant leader behavior pattern: https://brainly.com/question/15576767

#SPJ11

Do you like PC? Why? (I need your opinion for research)

Answers

Answer:

I do prefer a PC over a MacBook or other computers because you can customize the hardware and make it bette ring your own way unlike a MacBook where it’s all a secret and you can’t even try to pry it open and if you do the computer would stop working. You can customize your own features to make it better in your own way. A PC is pretty basic to use but the bad thing is that since the systems are most likely not protected, then many hackers/viruses could get in.

I like pc there affordable and work well but what the other person said the con is that they can catch virus or get hacked but I feel each has its pros and cons

Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online. buying software that allows them to track down bullies. changing passwords and screen names regularly. pretending to be someone else to hide their identity.

Answers

Answer: changing passwords and screen names regularly

Explanation:

Answer:

C.

Explanation:

changing passwords and screen names regularly.

Did it on edge.

what type of waves are used on a tv remote control?

Answers

Answer:

(IR) Light

Explanation:

The signal of the remote control, control the pules of the infrared light. But human eye cant see, but can see through a digital camera.

1. 2. 10 Snowflakes CodeHS

Does anyone have the code for this?

Thank you!

Answers

The Snowflakes problem on CodeHS involves using nested loops to create a pattern of snowflakes using asterisks.

Here is one possible solution:

The code starts by asking the user for a size input, which is used to determine the dimensions of the grid. The outer loop iterates through each row of the grid, while the inner loop iterates through each column.Inside the inner loop, there are four conditions to determine when to print an asterisk (*). The first condition checks if the current cell is on the main diagonal or one of the two diagonals next to it, and prints an asterisk if it is. The second and third conditions check if the current cell is in the top or bottom half of the grid and within the range of cells where the snowflake pattern should be printed. If the current cell does not meet any of these conditions, a space is printed instead.Finally, a newline is printed at the end of each row to move to the next line in the output.

For such more questions on CodeHS

https://brainly.com/question/15198605

#SPJ11

Question:-Learning Objectives In this challenge we will use our Python Turtle skills to draw a snowflake. We will use iteration (For Loop) to recreate ?

Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”

Python and using function

Answers

Answer:

def ix(s):

   return s[1:3]=="ix"

Explanation:

Which of the following is a way to keep you safe online? (select all that apply)

set up a spam folder
give out personal information to strangers
only open e-mails from people you know
keep anti-virus software up to date

Answers

Answer:

1). set up a spam folder

3).only open e-mails from people you know

4).keep anti-virus software up to date

Explanation:

IM DIFFERENT BREEED!

The options that are a way to keep you safe online are:

Set up a spam folder.Only open e-mails from people you know.Keep anti-virus software up to date.

What ways can keep you safe online?

When a person keep their personal information private and from online views, one can be able to keep themselves safe.

Conclusively, Note that a lot of  Hackers do make use of the profile of people on social media and as such, doing  the above things can help keep you safe.

Learn more about online from

https://brainly.com/question/2014724

#SPJ2

Individuals connect to the Internet through an __ (1) __ allowing them access to the system. The rules on the Internet for how messages are addressed and passed on are called __ (2) __ .

Answers

Answer:

1. Internet service provider (ISP)

2. Protocols.

Explanation:

Individuals connect to the Internet through an Internet service provider (ISP) allowing them access to the system. An ISP is a telecommunication company that provides internet services for other internet providers i.e they act as a backbone.

The rules on the Internet for how messages are addressed and passed on are called protocols.

A protocol can be defined as a standard set of rules established by the regulatory agencies to determine how data are transmitted from one network device to another.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

List out the wrap to options.​

Answers

It appears that you are requesting to know the Wrap Text Options in Microsoft word. Note that the options are indicated and explained below.

In Line with TextSquareTightThroughTop and BottomBehind TextIn Front of Text

What are the Wrap Text options in Microsoft Word?

In Microsoft Word, there are several options for wrapping text around an object or graphic. The wrap text options are as follows:

In Line with Text: This option inserts the object in the line of text, making the text wrap around the object.

Square: This option creates a square-shaped border around the object and wraps the text around the sides of the square.

Tight: This option wraps the text tightly around the contours of the object.

Through: This option allows the text to wrap around the object and appear in front of or behind the object as well.

Top and Bottom: This option creates a rectangular border around the object and wraps the text around the top and bottom edges of the rectangle.

Behind Text: This option places the object behind the text, with the text in front of the object and no wrapping.

In Front of Text: This option places the object in front of the text, with the text behind the object and no wrapping.

These options can be accessed by selecting an object or graphic in Microsoft Word and clicking on the "Wrap Text" button in the "Format" tab of the ribbon menu.

Learn more about Wrap Text Options:
https://brainly.com/question/30160011
#SPJ1

Full Question:

List out the Wrap Text Options in Microsoft Word

Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, network
attached storage, or the cloud?
Why?
What are some possible disadvantages of your recommendation that they should be aware of?

Answers

Answer:

I would recommend the cloud because they can access their data on every single device. There are virtually no disadvantages to the cloud.

Explanation:

Hope this helps.

Over the weekend, i was thinking about the process for analyzing the technology needs for this new department. the service department will need a system to support its unique needs of scheduling technicians, obtaining parts for repair, and setting up follow up appointments once parts are in-stock. i want to make sure that none of the analysis and design tasks fall through the cracks. i need you to identify all of the tasks that you will need to complete. i find it is helpful to create a work breakdown structure to identify the tasks. don't forget to include the system and industry analysis, system design, implementation plans, and security tasks in your wbs. what would be an example of a wbs?

Answers

The primary problem to be attained is the estimating of the sources. Its it good that one assign sources to all of the activity as in step with the things that can be done of that pastime and those to be finished efficiently as well as successfully.

What is WBS?

The term  Work Breakdown Structure (WBS) is known to be a form of an hierarchical statement of the tasks that is needed to complete a project.

Note that the WBS tends to “breaks down” the structure of a project into what we call the manageable deliverables.

The Work breakdown structure (WBS) in project management is also known as a method for finishing a complex, multi-step project  and as such, The primary problem to be attained is the estimating of the sources. Its it good that one assign sources to all of the activity as in step with the things that can be done of that pastime and those to be finished efficiently as well as successfully.

Learn more about Work Breakdown Structure from

https://brainly.com/question/3757134

#SPJ1

Complete the sentence.

involves placing a device on the network that captures all the raw data in the network traffic to try to find something valuable
A. Dumpster diving
B. Packet sniffing
C. Social engineering
D. Phishing

Answers

Answer:

D. Phishing

Explanation:

Answer: B. Packet sniffing

Explanation:

right on edge

help with this please anyone
Keywords:
-Virus
-Spyware
-Worm
-Trojan Horse
Definitions:
-This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.
-This type of malware can copy itself hundreds of times so can hard your device very quickly.
-A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.
-A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.
PLZ ANYONE HELP ME ​

Answers

Answer:

       trojan horse

         worm

         virus

        spyware

Explanation:

gimme the brainliest hehe

Answer:

1).Virus :- A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.

2).Spyware:- A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.

3).Worm:- This type of malware can copy itself hundreds of times so can hard your device very quickly.

4). Trojan Horse :- This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.

Explanation:

Pls give another person brainliest...

thanks hope it helps

Other Questions
which two phrases reflect the economic implications of islam?multiple select question.can earn a profit, but cannot keep it, as profit belongs to the communityhold property as trustees, rather than as owners (per western definition of ownership)cannot own property because all property is owned by religious leaderscannot earn profit through exploitation of others why does the liver need glucagon and epinephrin in activation of glycogen breakdown? Cost of goods sold is credited for the amount of the decrease in the LIFO reserve. True or False T/F. When speaking persuasively, it is ethical to omit relevant facts that support alternative viewpoints in an effort to bolster one's argument Explain in words and write mathematically how the Fundamental Theorem of Calculus is used to evaluate definite integrals. choose the correct answer below. Let f be continuous on [a,b]. To evaluate the definite integral of f using the Fundamental Theorem of Calculus, find any antiderivative of f and call it F. Then compute F(b) - F(a): the difference in the values of F between the upper and lower limits of integration. Written mathematically, f(x)dx = F(b)-F(a). Let f be continuous on [a,b].To evaluate the definite integral of f using the Fundamental Theorem of Calculus, find any antiderivative of f and call it F. Then compute F(b) - F(a): the sum of the values of F at the upper and lower limits of integration. Written mathematically f(x)dx = F(b) - F (a). Let f be continuous on [a,b].To evaluate the definite integral of f using the Fundamental Theorem of Calculus, find any derivative of f and call it f'. Then, compute f'(b) - f'(a): the difference in the values of between the upper and lower limits of integration. Written mathematically, f(x)dx = f'(b) - f'(a). Xerox Inc. has 1,050,000 shares of stock outstanding, then firm decides to give 25 percent stock dividend . If the share price after the stock dividend is 10 dirham then what was the original price per share? write a while loop that prints usernum divided by 2 (integer division) until reaching 1. follow each number by a space. example output for usernum = 40: Which of the following is another name for the required return on equity? A. Retention ratio B. Dividend payout ratio C. Discount rate D. Value Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?The GigabitEthernet interface is not activated.The router is configured for SLAAC operation.The DNS server address is not on the same network as the clients are on.The clients cannot communicate with the DHCPv6 server, evidenced by the number of active clients being 0. why does recrystallization of a compound usually result in its purification? Which of the following does NOT affect the potential hazards of a shoreline?Multiple ChoiceA. All these affect potential hazards of shorelines.B. Elevation of the land surface near the shore.C. The distribution of hard and soft rocks. Outside temperatures over a 24-hour period can be modeled by a sinusoidal function. Suppose the high temperature of 79F occurs at 6 PM an the average temperature for the 24-hour time period is 61F. Find the temperature at 7 AM to the nearest tenth of a degree. F which of the following statements is true regarding how scientific psychology differs from the popular psychology found on television shows, the internet, or in self-help books? popular psychology produces testable predictions, whereas scientific psychology deals only with theories. popular psychology offers experience-based explanations for behavior, whereas scientific psychology detaches itself from personal experience and relies instead on testable predictions. scientific psychology addresses a much broader range of issues and topics than popular psychology typically does and is more firmly grounded in rigorous research and empirical evidence. scientific psychology is only conducted in laboratories, whereas popular psychology is studied in a variety of settings. These men argue that concepts such as individual freedom and democracy are so important, they are worth fighting for. not all cell or tissue types in the human body can undergo fermentation. such cells can be grown in the lab in tissue culture as long as oxygen is supplied, but they will not survive under anoxic (no oxygen) conditions. which of the answer choices would be an experiment that would likely confirm the limiting substance during anoxic conditions for a lab culture of such a tissue/cell line? Only the first and second choices are correct.Polysaccharides always:Please choose the correct answer from the following choices, and then select the submit answer button.are a string of three or more sugar molecules.are polymers.contain lipids.All of the above are correct.Only the first and second choices are correct. a client is ready to push. the nurse instructs her to push vigorously and grunt and breathe out during a pushing effort. what would be important to monitor on the client while she is pushing vigorously? Please help me i begging youtopic: Additional diagnostic methods of lymphadenitis1) What lymphnodes can be affected by EBV infection?A. submentalB. submandibularC. cervical posteriorD. parotidE. occipital2) Computed tomography (CT)is useful:A. to depict deep lymph nodes.B. to evaluate these areas for other potential areas of lymphadenopathy.C. to determine a potential source of malignancy.D. all of above listed.E. to define of lymph node consistency.3) The falce parotitis it is:A. inflammation of lymph nodes into capsule of parotid gland.B. inflammation of superficial lymph nodes in parotid area.C. odontogenic abscess in parotid gland.D. stomatogenic cellulitis in cheek.E. mumps.4) What laboratory studies should be used for diagnosis of cats-scratch disease?A. gram stain.B monospot (in older children) or Epstein Barr virus (ebv) serologies.C. skin testing.D. culture of aspirated tissue or biopsy specimen.E. complete blood count.5) What complication can be developed when pus penetreted lymph nod ecapsule?A. adenophlegmon.B. furuncle.C. acute purulent periostitis.D. osteomyelitis.E. mediastenitis.6) I&D may be necessary by treatment of lymphadenitisif:A. patient with obscure diagnose.B. lymph node surrounding painful infiltrate.C. surgical biopsy is indicated.D. enlargement of superficial lymph node.E. an abscess has formed.7) To choose prescribe to biopsy by lymph node enlargement:A. once the etiology is known.B. if an abscess has formed.C. patients with some of the more obscure diagnoses.D. all of above listed.E. enlargement of a cervical lymph node to 1 cm in diameter if the diagnosis is otherwise uncertain.8) The most commonly used method is the surgical biopsy in which:A. taking a column of tissues by means of needle.B. separate cells of lymph node are imprinted on the glass.C. either a portion of the node or the complete node is excised.D. is presented ability to perform cytogenetics.E. none of above listed.9) Ultrasonography of lymph node may be performed to distinguish:A. all of above listed.B. the nature of the node if it is difficult to palpate.C. the abnormality from other potential anatomic structures.D. relations to contiguous structures and offer information about the content of the enlarged lymph node or nodes.E. the size of lymph node. Several salary surveys indicate that graduates who hold an Executive MBA will earn on an average Rs 250,000 P.A. more than their non certified counterparts. If you still have ten more years of service how much will you pay as fee for an Executive MBA programme today? Assume interest rate of 7%. A Normal population has mean = 10 and standard deviation = 3. Suppose a random sample of size n = 40 is selected. Calculate the probability that the sample mean is between 9.0 and 11.0?If the true percentage of voters who support a Candidate is 40%, what is the probability that in a sample n = 200 voters the percentage who support the candidate will be between (a) 40% and 45%?, (b) more than 50%?