Which of the following is an example of a database?
A. the names and ages of children
B. the title of a book
C. a word that rhymes with bat
D. the name of the most recent U. S. president

Answers

Answer 1
A. The names and ages of children
Answer 2

Answer:

the names and ages of children


Related Questions

Anyone who know how to use canva .com please make a logo of the name : Deadly Sins

Answers

Answer:

Yes ma'am as in the anime?

Explanation:

Cuz there's a anime show called 7 deadly sins or just deadly sins?

Answer:

hello give the person above brainlist

Explanation:

According to forrester, what emerging technology is likely to improve service and create efficiencies by replacing many tasks that depend upon humans, such as customer service representatives, truck drivers, and taxi drivers?

Answers

According to forrester, the  emerging technology that is likely to improve service and create efficiencies by replacing many tasks that depend upon humans, such as customer service representatives, truck drivers, and taxi drivers is Augmented and Virtual Reality.

What exactly is augmented reality?

A computer-generated perception of the real world is enhanced through an interactive experience called augmented reality. Augmented reality uses software, apps, and hardware like AR glasses to superimpose digital material over actual settings and objects.

Therefore, AR enhances a real-world scene, while VR provides an immersive virtual experience. While just 25% of AR is virtual, VR is 75% virtual. Unlike AR, VR requires a headgear device. While AR users interact with the real world, VR users navigate through a wholly made-up environment.

Learn more about Augmented and Virtual Reality from

https://brainly.com/question/22621708
#SPJ1

State 3 limitations of the ancient methods of information transmission​

Answers

Answer:

(I put two more just incase )

1 lack of speed. 2 lack of sustainability.3 fragile4 low security measures.5 lack of comparability

How to write a pseudocode to read a sequence of numbers terminated by the number 999 and print the sum of the positive numbers and the product of the two numbers

Answers

Answer:

The pseudocode (1) and (2) is as follows:

Pseudocode (1):

sum = 0

input n

while n ! = 999

   if n > 0

     sum+=n

Print sum

Pseudocode (2):

Input n1, n2

product = n1 * n2

Display product

Explanation:

Pseudocode (1):

sum = 0 --- Initialize sum to 0

input n --- Input a number

while n ! = 999 --- The loop is repeated until 999 is entered

   if n > 0 --- Check if n is positive

     sum+=n --- Compute the sum, if true

     input n --- Get another input

Print sum --- Print the calculated sum

Pseudocode (2):

Input n1, n2 --- Get input for both numbers

product = n1 * n2 --- Compute their products

Display product --- Print the calculated product

Which of the following is not one of the three defining characteristics of a portal? A) commerce B) content C) auctions D) navigation of the Web

Answers

The three fundamental features of a portal do not include auctions. The three defining virtues of portals are personalisation, consistency, and integration.

What is the portal's architecture?

Architecture is the art and technique of designing and building, as opposed to the skills associated to construction. Drawing, imagining, planning, designing, and building are all procedures that go into the creation of buildings and other structures.

What role does the portal play?

Clients can easily access pertinent information via portals, including FAQs, troubleshooting advice, company and product data, and much more. This data is accurate and current thanks to well-managed portals. Major general portals include AOL.com by America Online, Yahoo, Excite, Netscape, Lycos, CNET, and Microsoft Network.

To know more about portal visit:-

https://brainly.com/question/29315516

#SPJ4

Which of the following is an example of an application ?

Which of the following is an example of an application ?

Answers

The third one I think
The 3rd one cause all the others are brands pretty much

_______ consists of the programs that control or maintain the operations of the computer and its devices. A. A graphical user interface (GUI) B. A communications device C. System software D. Application software

Answers

The term that consists of the programs that control or maintain the operations of the computer and its devices is system software.

This software controls or maintains the functioning of the computer, its hardware, and its software applications.

It plays a key role in managing the computer's memory, input/output, and processing.

The system software provides a platform for the applications to run on.

It is the bridge between the hardware and the application software.

System software consists of several programs such as an operating system, device drivers, utility programs, and more.

System software includes the following:

Operating system

Device driversUtility programs: Language translatorsFirmwareThe operating system is the most important and essential system software.

The operating system is responsible for managing the hardware resources and providing common services for the application software.

Know more about programs  here:

https://brainly.com/question/30783869

#SPJ11

A metaphor of human-computer interaction (HCI) in which interacting with the computer, is much like carrying on a conversation is called a _______ metaphor.

Answers

The answer is
Dialog metaphor.

HURRY GIVING BRAINLIEST AND ALL MY POINTS and I only have 40


Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:


1. Decide on the message you would like to display to the screen. Some ideas include:

1. Your favorite book title or TV show and why you like it

2. A few sentences sharing information about you

3. Your favorite sport and team or athlete

4. Use two variables to store your message.

Answers

Answer:

Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:

1. Decide on the message you would like to display to the screen. Some ideas include:

1. Your favorite book title or TV show and why you like it

2. A few sentences sharing information about you

3. Your favorite sport and team or athlete

4. Use two variables to store your message

Explanation:

Answer:

A few sentences about you .

Explanation:

why do we have layers in the osi model and protocols in general? mention the seven layers of the osi stack, and describe the basic function of each layer.

Answers

We have layers in the OSI model and protocols in general to ensure organized communication between different systems, enhance Compatibility, and facilitate troubleshooting.

The seven layers of the OSI model are:

1. Physical Layer: Handles the transmission of raw data as bits through physical mediums such as cables or wireless signals.
2. Data Link Layer: Establishes a reliable link between two network nodes, handles error detection and correction, and manages data frames.
3. Network Layer: Routes and manages data packets between different networks, determining the optimal path for data transmission.
4. Transport Layer: Provides reliable end-to-end data communication by managing data segmentation, flow control, and error correction.
5. Session Layer: Establishes, manages, and terminates sessions between applications on different devices, allowing them to exchange data.
6. Presentation Layer: Translates, encrypts, and compresses data to ensure compatibility between applications on different systems.
7. Application Layer: Provides the interface for users and applications to interact with the network, enabling tasks like email and web browsing.

Each layer plays a specific role, allowing for a modular approach to communication and making it easier to implement and update protocols.

To Learn More About Compatibility

https://brainly.com/question/29822179

SPJ11

Sonja is a network engineer and has just installed a new device that she wants to manage through the network management station. Which of the following might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP?
a. OID b. TRAP c. TTF d. MIB

Answers

The option that might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP is  option a. OID.

What purpose do database files serve?

Data records or files containing information, including as sales transactions, customer information, financial data, and product information, are often aggregated and stored in computer databases. Any type of data can be stored, maintained, and accessed using databases.

Hence, A string of decimal integers called an object identifier (OID) uniquely identifies an object. These things are usually an attribute or an object class. You can supply the object class or attribute name added with -oid if you don't have an OID.

Learn more about OID from

https://brainly.com/question/29441658
#SPJ1

A professional photographer working for a top newspaper would like control over the quality and editing
process of digital photos. Which file format should be used on the digital camera to ensure the
photographer has this flexibility?
A. AI
B. JPEG
C. RAW
D. SVG

Answers

Answer:

RAW

Explanation:

raw usually gives you the best quality possible and its easy to go through the editing process with flexibility compared to the other options.

Answer: raw

Explanation: got a 100%

Which type of cryptography uses two mathematically linked keys, one key encrypting the data and the other decrypting the data?
Asymmetric
Encoding
Firewall
Symmetric

Answers

Answer:

Asymmetric.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

There are two (2) main types of encryption techniques used in cryptography and these are;

I. Symmetric encryption.

II. Asymmetric encryption.

Asymmetric encryption is a type of cryptography which uses two mathematically linked keys, one key encrypting the data and the other decrypting the data. These two keys are generally referred to as a public key and a private key respectively.

This ultimately implies that, a pair of key (two keys) that are different in values is required or needed to make a computer system secured.

Please please please help I beg I'll give brainiest. :(

A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable

Answers

Answer:

A) toggle switch B) Push to Make switch C) Monostable

Explanation:

toggle because it needs to go off when the timer ends and not when u press a button

Push to make because you turn the timer off manually

Monostable because it needs to go off once not repeatedly

Salim wants to add a device to a network that will send data from a computer to a printer. Which hardware component should he use?

A.
repeater
B.
modem
C.
switch
D.
bridge

Answers

It’s letter B good luck
I think person above is correct (sorry if I'm wrong I just need points)

what is the code i need to do

what is the code i need to do

Answers

What section is it? I did the same thing a bit ago on edhesive

What will the Document search option search through?

Answers

Answer:

hi

Explanation:

nynttnynybynynynumkol0

A student entering high school is pursuing STEM education. What can you infer about this student?

Answers

Answer: according to my calculations, we can infer that the student is pursuing a STEM education

Explanation:

Answer:

he likes Science, technology, engineering, and mathematics

Explanation: beacause it makes sense

Define columns ,types of columns and it's stability and
equilibrium conditions?

Answers

The column stability factor, or CP, ought to be set to 1.0 when calculating the crushing stress of a wood compression member.

A parameter in the calculation of the allowable compressive stress for wood compression members is the column stability factor, or CP. It considers the thinness proportion of the part, which is the proportion of the successful length of the part to its least sweep of gyration.

The allowable compressive stress in wood design is determined by a variety of equations and factors based on the member geometry, loading conditions, and type of wood. One usually involved condition for wood pressure individuals is the Euler clasping condition, which decides the basic clasping load for a thin section.

Learn more about crushing stress here :

brainly.com/question/30214665

#SPJ4

Kaitlin likes a particular design theme, but she is not sure about every single color for bullets, backgrounds, etc. found in the theme. which feature should she apply to modify the theme to her liking? a. background style b. edit master slides c. theme variantsd. custom slide

Answers

The best particular design theme can be done through a few modifications using theme variants.

What is Theme Variant?

When a theme is applied to a presentation, the right corner of the Design tab displays variations of the selected theme.

Variants are different versions or designs of the currently selected theme Variations give your presentation a different look.

Why do we need theme variant?

Themes provide a quick and easy way to change the design of your presentation. They determine the basic color palette, basic fonts, slide layout and other important elements All elements of the  theme  work well together, meaning you  spend less time formatting your presentation

To know more about theme visit:

https://brainly.com/question/20004132

#SPJ1

an employee complains that a windows pc cannot connect to the internet. a network technician issues the ipconfig command on the pc and is shown an ip address of 169.254.10.3. which two conclusions can be drawn? (choose two.)

Answers

The PC is not receiving a valid IP address from the network's DHCP server and that it is using an automatic private IP addressing (APIPA) address.

What is IP address?Each device connected to a computer network that uses the Internet Protocol is given a unique numerical label known as an IP address. In most networks, IP addresses are assigned to devices dynamically by a DHCP (Dynamic Host Configuration Protocol) server, which assigns a unique IP address to each device on the network.If a device is unable to obtain a valid IP address from the DHCP server, it may use an APIPA address instead. APIPA addresses are reserved for use in situations where a device is unable to obtain a valid IP address from the DHCP server, and are in the range of 169.254.0.0 to 169.254.255.255. When a device uses an APIPA address, it means that it is unable to communicate with the DHCP server and may not be able to access the internet or other resources on the network.

To learn more about IP address refer :

https://brainly.com/question/14219853

#SPJ4

Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?

A.
alongside the development of the app

B.
after the app has been developed

C.
during the testing phase

D.
during the design phase

Answers

Answer:

C option

Explanation:

Because in testing phase the game has been developed and test for errors in game.

Jack is a forensic specialist who wants to examine a network router for potential evidence in a case. What is the first step he should take to safely examine the router

Answers

The step that can be carried by Jack for the safe examination of the router as the case evidence is connecting the router to the network.

What is a network router?

The network router is given as the connection between the two networks that mediate the delivery of the packed information.

The safety of the router in the forensic evidence is important as the incorrect connection resulting in corruption and deletes all the data.

Being the specialist, to check the router, the first step to be followed by Jack was connecting the router to the network.

Learn more about routers, here:

https://brainly.com/question/15851772

#SPJ1

what is crowd sourcing​

Answers

Answer:

The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.

Explanation:

Just search on the internet

The DESCRIBE TABLE command defines a SQL table's structure by listing its columns, data types, and column lengths. true or false

Answers

True, the DESCRIBE TABLE command in SQL defines a table's structure by listing its columns, data types, and column lengths.

The DESCRIBE or DESC command in SQL is used to display the structure of a table. When you run the DESCRIBE command on a table, it will list the columns of the table along with their data types, column lengths, and any constraints that have been defined on the columns. This information can be helpful in understanding the structure of the table and the types of data it contains.

For example, to describe the structure of a table named employees, you would use the following command:

DESCRIBE employees;

This command will display the column names, data types, and lengths of the columns in the employees table. The output of the command will vary depending on the database management system being used.

To know more about database management system (DBMS) visit:

https://brainly.com/question/13266483

#SPJ11

supposed that, your computer is a part of a company domain, and if there is a malicious connection in this device that you saw in the netstat results, what would your recommendation be for effective incident response in a company domain? how would you handle this case in the whole company network?

Answers

If there is a malicious connection on a computer that is part of a company domain, it is important to take immediate action to prevent further damage.

Here are the steps I would recommend for effective incident response:

1. Disconnect the affected computer from the network: This will prevent the malicious connection from spreading to other devices on the network.

2. Notify the IT department: The IT department should be notified immediately so that they can begin investigating the incident and taking appropriate action.

3. Run a malware scan: Use a reputable malware scanner to scan the affected computer and remove any malicious software that is found.

4. Change all passwords: It is important to change all passwords associated with the affected computer and any other accounts that may have been compromised.

5. Conduct a thorough investigation: The IT department should conduct a thorough investigation to determine the source of the malicious connection and take steps to prevent similar incidents from occurring in the future.

6. Implement additional security measures: This may include updating software and security protocols, implementing additional firewalls, and providing employee training on cybersecurity best practices.

By taking these steps, you can effectively respond to a malicious connection in a company domain and prevent further damage to the network.

Learn more about company domain:

https://brainly.com/question/16381617

#SPJ11

Choose the correct term to complete the sentence.

______ uses objects that represent classes to manage, manipulate, and store data.

•Object-defined programming

•Object-oriented programming

•Oriented programming

Answers

Answer:

Object-oriented programming

Explanation:

When used in object-oriented programming , a class is a factory for creating object. An object is a collection of data and behavaiors that represent some entity(real or abstract).

Answer: Object-oriented programming

Explanation: got it right on edgen

Complete the Car class by creating an attribute purchase_price (type int) and the method print_info that outputs the car's information. Ex: If the input is:
2011
18000
2018
​where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs: Car's information: Model year: 2011 Purchase price: $18000
Current value: $5770
Note: print_infol should use two spaces for indentation. LAB: Car value (classes) \\ ACTIVITY & \end{tabular} main.py Load default template... 1 class Car: 2. def__init__(self): 3. self.model year=0
4. self. purchase_price=0
5. self.current_value=0
6
7. def calc_current_value(self, current_year): 8. self.current_value=round(self.purchase_price∗(1−0.15)∗∗(current_year - self.model_year)) 9. 10. def print_info(self): 11. print("(ar's information:") 12. print(" Model year:", self.model_year) 13. print(" Purchase price: \$", self.purchase_price) 14. print(" Current value: \$", self.current_value)

Answers

Answer:

class Car:

def __init__(self):

self.model_year = 0

self.purchase_price = 0

self.current_value = 0

def calc_current_value(self, current_year):

self.current_value = round(self.purchase_price * (1 - 0.15) ** (current_year - self.model_year))

def print_info(self):

print("Car's information:")

print(" Model year:", self.model_year)

print(" Purchase price: ${:,}".format(self.purchase_price))

print(" Current value: ${:,}".format(self.current_value))

Explanation:

The purchase_price attribute has been added to the init() method and that the print_info() method now formats the purchase price and current value with commas using the format() function.

do u see abs??????????

do u see abs??????????

Answers

Answer

of course, y u askin tho, im pretty sure every person who doesnt have a sight disability can see her abs as well

Explanation:

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

Other Questions
how did colonialism shaped/continues to shape the development of Benin? NEED HELP ASAP!Which skill will help you be able to move around other players in a soccer game?A. PowerB. AgilityC. Reaction timeD. Speed which innovation had the effect of producing electricity and improving farming? Explain how to make 1 liter of a 0.45 m solution of k 2 s o 4 k2so4 using k 2 s o 4 k2so4 powder and water. The ratio of paperback books to hardcover books in a bookstore display is 8:5. If there are 30 hardcover books in the display, how many paperback books are in the display?A 28B 33C 48D 60 Show work for f(4) = 3x + 2 is 3 rational or irrational What diagnosis ofLoss of Consciousness (LOC) Physical Exam describe the physical features of Greece and how those features influence the development of ancient Greece Which detail is provided in BOTH the firsthand and the secondhand accounts? it is time for annual performance evaluations. amber, the marketing manager, rates jade much higher than her other employees because jade, like amber, is from the bahamas. this is an example of the... what is the most complete description of where wind shear associated with a thunderstorm can be found? according to the text, how should moral philosophy begin?from a set of moral principles that cannot be doubtedfrom a set of plausible ethical claims that is subject to revisionfrom a set of moral rules that is clear enough so as to not require interpretationnone of the above Jadas dog was 5 1/2 inches tall when it was a puppy. Now her dog is 14 1/2 inches taller than that. How tall is Jadas dog now? The total cost, c, in dollars, of b bottles of water is c = 1.1b. What is the canstant of proportionality? A football game has four quarters. The results at the end of each quarter for two teams are shown in the graph and table, respectively. In quarter 3, Team 1 scored Team 2. In quarter 4, Team 2 scored Team 1. Help&EXPLAIN Dont use for points or will be reported and Ill take the points back The determinants of economic growth in the longer term According to the Solow model, with a constant amount of labour and constant technology, increases in the quantity of capital will lead to: Select one: O a. output per worker declining at a decreasing rate. O b. output per worker remaining constant. O c. output per worker increasing at an increasing rate. output per worker declining at an increasing rate. O d. O e output per worker increasing at a decreasing rate. A shoe store donated a percent of every sale to charity. a the total sales were $9,800 so the store donated $588. What percent of $9,800 was donated to charity? 5)Find the mean, median, mode, range, first quartile, third quartile, and the interquartile range foreach data set given. Is the data skewed?a. 7, 12, 1, 7, 6, 5, 11, 10, 14, 16, 16, 8, 9, 11, 12, 3b. 85, 105, 95, 90, 115, 10, 8, 7, 5, 9, 10, 7