Which can be used to enter and manipulate information in a database?

ANSWER: C) a form

Answers

Answer 1

Answer:

a form

Explanation:

it says the answer already in the question


Related Questions

Which of the following do you do to select text?
a
press CTRL+T
b click and drag across the desired text
000
C right-click and drag across the desired text
d press CTRL+S

Answers

To select text, the following can be done: a. Press CTRL+T b. Click and drag across the desired text c. Right-click and drag across the desired text d. Press CTRL+S.

The correct answer to the given question are options a, b, c and d.

The above options can be used in selecting text. The most common methods used for selecting text include clicking and dragging, double-clicking, and triple-clicking.

To select text by clicking and dragging, click at the beginning of the text, and drag to the end of the text while holding down the left mouse button. This method is useful for selecting large blocks of text. Double-clicking on a word selects that word, and triple-clicking on a paragraph selects the entire paragraph.

Alternatively, to select a sentence, double-click on the sentence.

Similarly, to select a paragraph, triple-click the paragraph. To highlight text by dragging the mouse pointer over it, left-click and hold at the beginning of the selection, drag the pointer across the text while still holding down the left mouse button, and then release the button when the selection is complete. The cursor changes to a pointer when it is moved over text.

For more such questions on select text, click on:

https://brainly.com/question/26940131

#SPJ8

25 Points !! HELP ASAP . DUE TOMORROW MORNING .

Imagine you are scrolling through your social media and you see these two links, which one would you click on? Why? Explain answer 2-3 sentences long .

25 Points !! HELP ASAP . DUE TOMORROW MORNING . Imagine you are scrolling through your social media and

Answers

Answer:

The Associated Press

Explanation:

Out of the two options presented, The Associated Press caught my attention more due to its compelling content. The content displayed is visually appealing and likely to pique one's curiosity, motivating one to seek further information.

Part 3 (The stunner)

Part 3 (The stunner)
Part 3 (The stunner)

Answers

Answer:

nice :)

Explanation:

Answer: Once again, levers where we cant see.

I need help including my other one I posted

I need help including my other one I posted

Answers

Answer:

2. I like the form of it, I like the porportion of it.

3. I dont know what a purpose of this maybe it a person wearing a tuexdo stepping out of his house or something.

4. Another thing that would work well is texture.

Write an assembly code
Read 1 byte number (between 0 and 9). Write a program that prints:

It's ODD

if input is odd and prints

It's EVEN if input is even

Answers

; Read input byte

MOV AH, 01h ; Set up input function

INT 21h ; Read byte from standard input, store in AL

; Check if input is even or odd

MOV BL, 02h ; Set up divisor

DIV BL ; Divide AL by BL, quotient in AL, remainder in AH

CMP AH, 00h ; Compare remainder with zero

JNE odd ; Jump to odd if remainder is not zero

JMP done ; Jump to done if remainder is zero

odd: ; Odd case

MOV DX, OFFSET message_odd ; Set up message address

JMP print

even: ; Even case

MOV DX, OFFSET message_even ; Set up message address

print: ; Print message

MOV AH, 09h ; Set up output function

INT 21h ; Print message

done: ; End of program

Which part of project management involves determining the required materials?

A.) Money
B.)Resources
C.)Scope
D.)Time

Answers

Answer:

Resources I think because what you have all depends on resources which required money

PLZ CORRECT ME IF I AM Wrong please and thank you

Explanation:

Is resources :))))))))))))))))))

Which of the following would you use to search a table in excel?


Decenter

Merge

Find and select

Clear rules

Answers

It’s fine and select

Description:
Read integer inCount from input as the number of integers to be read next. Use a loop to read the remaining integers from input. Output all integers on the same line, and surround each integer with curly braces. Lastly, end with a newline.

Ex: If the input is:

2
55 75
then the output is:

{55}{75}

Code:
#include
using namespace std;

int main() {
int inCount;

return 0;
}

Description:Read integer inCount from input as the number of integers to be read next. Use a loop to

Answers

Here's the modified code that includes the requested functionality:

#include <iostream>

using namespace std;

int main() {

   int inCount;

   cin >> inCount;

   for (int i = 0; i < inCount; i++) {

       int num;

       cin >> num;

       cout << "{" << num << "}"; }

  cout << "\n";

   return 0;}

In this code, we first read the integer inCount from the input, which represents the number of integers to be read next. Then, using a loop, we read each of the remaining integers from the input and output them surrounded by curly braces {}. Finally, we print a newline character to end the line of output.

Learn more about integer loop, here:

https://brainly.com/question/31493384

#SPJ1

2.1 [5] <§2.2> For the following C statement, what is the corresponding MIPS assembly code? Assume that the variables f, g, h , and i are given and could be considered 32-bit integers as declared in a C program. Use a minimal number of MIPS assembly instructions. f = g + (h – 5);
2.3 (Hint: Every array element occupies four memory addresses).
2.3 [5] <§§2.2, 2.3> For the following C statement, what is the corresponding MIPS assembly code? Assume that the variables f , g , h , i , and j are assigned to registers $s0 , $s1 , $s2 , $s3 , and $s4 , respectively. Assume that the base address of the arrays A and B are in registers $s6 and $s7 , respectively. B[8] = A[i–j];
sub
2.6.2 (No need to do it with a sorting algorithm, just use lw and sw).
The table below shows 32-bit values of an array stored in memory.
For the memory locations in the table above, write MIPS code to sort the data from lowest to highest, placing the lowest value in the smallest memory location. Use a minimum number of MIPS instructions. Assume the base address of Array is stored in register $s6 .
2.27 (Hint: Use slt, beq and j to make loops happen).
2.27 [5] <§2.7> Translate the following C code to MIPS assembly code. Use a minimum number of instructions. Assume that the values of a , b , i , and j are in registers $s0 , $s1 , $t0 , and $t1 , respectively. Also, assume that register $s2 holds the base address of the array D. for(i=0; i for(j=0; j D[4*j] = i + j;

Answers

According to the question of array, the following code is given below:

What is array?

An array is a data structure that stores a collection of items, usually of the same type. It is often used to store a list of elements that need to be processed in some way. An array can be used to store multiple values at once, and allows for efficient manipulation of the data that it holds. It is a type of data structure that is used to store elements of the same type in contiguous memory locations, allowing for efficient access and manipulation of the elements.

# MIPS loop code

slt $t2, $t0, $t1     # compare i and j

beq $t2, $zero, exit   # if i >= j, exit loop

add $t3, $t0, $t1     # calculate i + j

sll $t4, $t1, 2       # calculate 4 * j

add $t4, $t4, $s2     # calculate address of D[4*j]

sw $t3, 0($t4)        # store i + j at D[4*j]

addi $t1, $t1, 1      # increment j

j loop                # jump back to beginning of loop

exit: # exit loop

To learn more about array
https://brainly.com/question/28565733

#SPJ1


A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Answer:

at this day and age, any. My questions would focus around other applications at this point.  250 gb or larger.

Explanation:

Office 365 only uses 4 GB "Microsoft's store page", the smallest hard drives commonly available are 250 GB and larger.  

draw internal architecture of computer​

Answers

Answer:

If this is good, let me know in the comments and I'll draw it

Explanation:

draw internal architecture of computer

Please help ASAP!
Which type of game is most likely to have multiple different outcomes?

A. shooter game

B. puzzle game

C. platform game

D. role-playing game

Answers

Role play game multiple options involved

Which of the following can be set to make your presentation automatically progress through slides in PowerPoint

Answers

When you set up each slide, you can choose to set the time value for each slide regarding how long you want to fly to show before it moves on to the next slide. You can set that up in the slide's properties.

Your friend really likes talking about owls. Write a function owl_count that takes a block of text and counts how many words they say have word “owl” in them. Any word with “owl” in it should count, so “owls,” “owlette,” and “howl” should all count.

Here’s what an example run of your program might look like:

text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
owl_count(text)
# => 4
Hints

You will need to use the split method!


Here is what I have so far, it doesn not like count = 0 and i keep getting an error.
def owl_count(text):

count = 0

word = 'owl'

text = text.lower()

owlist = list(text.split())

count = text.count(word)


text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
print (count)

Answers

text = “ I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl.

word = ‘owl’
texts = text.lower()
owlist = list(texts.split())
count = text.count(word)
num = [owlist, count] #num has no meaning just random var
print(num)


Alter in anyway you want so that you can succeed. ✌

In this exercise we have to use the knowledge of computational language in python, so we find the code like:

The code can be found attached.

So let's write a code that will be a recognition function, like this:

def owl_count(text):"I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight?"

word = "owl"

texts = text.lower()

owlist = list(texts.split())

count = text.count(word)

num = [owlist, count] #num has no meaning just random var

print(num)

See more about python at brainly.com/question/26104476

Your friend really likes talking about owls. Write a function owl_count that takes a block of text and

Eliana is doing a research project about ocean wildlife. What search criteria should she use to search for the information?

Lake AND ocean NOT wildlife
Ocean OR wildlife
Ocean OR lake AND wildlife
Wildlife AND ocean

Answers

Answer: Wildlife and ocean

please i need help asap i will mark brainlest
Which of the following are notes which can be electronically entered into documents without changing the content of the document?
Question 1 options:

Comparisons


Comments


Changes


Reviews

Answers

Comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.

What are the characteristics of word documents?

The characteristics of word documents are as follows:

It allows a user to construct professional write-ups.It has editing and formatting tools that modify the existing documents.It authorizes the user to insert charts, tables, diagrams, etc. within the document to make it more attractive.

In this question, the significance of a comment is better understood by the fact that it represents the notes a reader can normally insert within the existing document in order to modify or highlight the required text in the document.

Therefore, comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.

To learn more about Documents, refer to the link:

https://brainly.com/question/1218796

#SPJ1

A user needs to communicate the same message with 20 people in a company. The message is lengthy with several images included in it. Which communication method would best fit this scenario? Describe the etiquette associated with communicating in this method.

Answers

Since the user needs to communicate the same message with 20 people in a company. The communication method would best fit this scenario is the use of a bulk email message.

What does "mail message" mean?

An email message is a text that is transmitted or received over a computer network and is often short as well as casual. Email communications are often only text messages, but they can also contain attachments (such spreadsheets and graphic files). Multiple people can receive an email message at once.

Therefore, The exchange of communications using electronic devices is known as electronic mail. At a time when "mail" solely referred to physical mail, email was therefore conceptualized as the electronic equivalent of or counterpart to mail.

Learn more about email message from

https://brainly.com/question/6180841
#SPJ1

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

what's drawing toolbar​

Answers

Answer:

The drawing toolbar, a feature in Microsoft Word, is a collection of many tools to draw and colour shapes, add text effects, create text boxes, and add graphics with colours within a Word document. In addition, users could choose from pre-drawn shapes, add clip art or draw shapes as desired.

A cyberbully is someone who invades another person’s privacy by posting mean-spirited messages. repeatedly sending text messages. visiting questionable websites. stealing original work.

Answers

Answer:

Its A.

Explanation:

Took the exam review

Answer:

A

Explanation:

on edge

Write a program to create an array of size m X n and print the sum of all the numbers row wise in java

Answers

Answer:

Here is the program to create an array of size m X n and print the sum of all the numbers row wise in Java:

```

import java.util.Arrays;

public class ArraySumRowWise {

   public static void main(String[] args) {

       int m = 3;

       int n = 4;

       int[][] arr = {{1, 2, 3, 4}, {5, 6, 7, 8}, {9, 10, 11, 12}};

       // Print the original array

       System.out.println("Original Array:");

       for (int[] row : arr) {

           System.out.println(Arrays.toString(row));

       }

       // Compute and print the row wise sum

       System.out.println("Row Wise Sum:");

       for (int i = 0; i < m; i++) {

           int rowSum = 0;

           for (int j = 0; j < n; j++) {

               rowSum += arr[i][j];

           }

           System.out.println("Row " + (i+1) + ": " + rowSum);

       }

   }

}

```

Explanation:

In this program, we have created an array of size 3 X 4 and initialized it with some values. We have then printed the original array and computed the row wise sum by iterating over each row and adding up all the elements. Finally, we have printed the row wise sums. You can replace the values of m, n, and arr with your own values to test the program with different array sizes and values.



The computing field tends to be
some minority groups. Select 2 options.
discouraging towards
underrepresented by
full of
overrepresented by
satisfactory to

Answers

Answer:Below

Explanation:

The computing field tends to besome minority groups. Select 2 options.discouraging towardsunderrepresented

The computing field tends to be discouraging towards and underrepresented by some minority groups.

The computing field is often discouraging towards and underrepresented by certain minority groups which means that individuals from these groups face challenges and obstacles in accessing and thriving in the field, while their presence and representation within the computing industry are significantly lower compared to other groups.

Efforts are needed to address these disparities and create a more inclusive and diverse computing community.

To learn more on Computing field click:

https://brainly.com/question/30168113

#SPJ2

With clear examples, describe how artificial intelligence is applied in fraud detection

Answers

Answer:

AI can be used to reject credit transactions or flag them for review. Like at Walmart

Explanation:

I work with AI, i know what i'm talking about.

Machine learning enables you to give
instructions to a computer by programming it
with examples. Humans provide the necessary
input for the computer's learning and
improvement. True or false?
A True
B) False

Answers

Answer:

its true brooooooooooooooooooo

What is used for risk response control?

Answers

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

Looking at the code below, what is the height of your GUI window?

setSize(500,400);


100

500

400

900

Answers

Answer:

Doey

So you gotta doey, it should be 900, the doey is sometimes wrong so be patient

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?

Answers

Answer:

There are two basic operational modes of 8255:

Bit Set/Reset mode (BSR mode).

Input/Output mode (I/O mode).

Features of 8255 Microprocessor:

Mode 0 : Simple Input/Output.

Mode 1 : Input/Output with handshake.

Mode 2 : Bi-directional I/O data transfer.

It has three 8-bit ports : Port A, Port B, and Port C, which are arranged in two groups of 12 pins.

The 8255 can operate in 3 I/O modes : (i) Mode 0, (ii) Mode 1, & (iii) Mode 2.

It is only likely for a guest to receive outstanding service at luxury brands. That's why Ritz-Carlton, Mandarin Oriental, Four Seasons, and others are the best at what they do.

Answers

Answer:

FALSE

Explanation:

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

Other Questions
I am a microorganism that helps to increase soil fertility naturally.RibosomesRhizobiumLeguminous plants 1. Inte the size of angle Mae a fraction, Then we decimal rounded to the 8-20 Solve the inequality 2x - 5 \le -x +12. Give your answer as and Interval Exercise 1 Underline nouns once and verbs twice. Draw a vertical line between each complete subject and complete predicate. Label adjectives Adj., articles A., adverbs Adv., direct objects D.O., and indirect objects I.O.Someone left an unfinished jigsaw puzzle on the table. The cost of renting a car is $85/wk plus $0.15/mi traveled during that week. An equation to represent the cost would be y = 85 + 0.15x, where x is the number of miles traveled. If your cost was $94.75, how many miles were you charged for traveling? Which part of the article helps readers understand why the Indianapolis was targeted by a Japanese submarine? IN THE LOST SHIPA. the section Honor RestoredB. the caption The WarC. the section A New MissionD. the caption The Ship A homecoming parade will run 3 miles long (1 mile= 5280ft) and 8 feet deep on both sides of the street. How many people could be at the parade? ( rule of thumb is, 6 people can fit in a 25ft^2 area) an employee has just been discharged from his job after the company he was working for started downsizing. confused about his state of joblessness, the employee threatens to sue the company for reparations. which program can help the company avoid such situations from exiting employees? Find the perimeter of rectangle MNOP with vertices M (-2,5), N (-2, -4), O (3, -4), and P (3,5)Part B: Square ABCD has vertices, A (-3.5, 4), B (3.5, 4), C (3.5, -4) and D (-4.5, -4. What is the area of Square ABCD? most people find the easiest way to avoid cognitive dissonance is to avoid exposure to sources that cause it. A restaurant has a total of 60 tables. Of those tables, 38 are round and 13 are located by the window. There are 6 round tables by the window.If tables are randomly assigned to customers, what is the probability that a customer will be seated at a round table or by the window? (29/60, 47/60, 41/60, or 45/60) a client asks the nurse what factors affect how long it will take for a hip to heal following hip replacement surgery. what are the best responses by the nurse? select all that apply. Which statement is an example of the authors use of logos in The Dangnation of CanyonThe author explains that he has first hand experience and is considered a expert. The Author offers definition of words to clarify the terms for the reader The author creates a beautiful picture of the area before the d*m was built The author uses a sarcastic tone to make other arguments sound unreasonable Why does Philostrate try to keep Theseus from seeing the play? What does he say is wrong with it? client with type 1 diabetes asks what causes the several brown spots on the skin. what would be the best response by the nurse? brainly for right ans nelly really likes rico. they don't go out often, but when they do, they engage in fun activities but rarely talk or develop any emotional closeness. this is most likely because . Which cell type is produced by mitosis?A) haploidB) diploidC) spermD) gamete Hailey has $9 worth of nickels.how many nickels does hailey have? How were the elections different in 1800 than they are today?