1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
2 years ago
15

Explain where the “heart” of the station is and what can be found there? I will mark brainlyest! This is for the ISS (Internatio

nal Space Station)
Computers and Technology
2 answers:
Annette [7]2 years ago
7 0

Answer:

Zevzda

Explanation:

Check for yourself if you think i'm wrong

lesya [120]2 years ago
6 0
It is the Zvezda. You can find two compartments, one in which you live and work, and one where you can find a transfer chamber.
You might be interested in
Choose all statements that identify the benefits of programming design.
Lubov Fominskaja [6]

Answer:

yes

Explanation:

it provides a design approach to a specific type of problem

4 0
3 years ago
Read 2 more answers
. Briefly describe an SQL DML statement for changing existing data in a table.
bearhunter [10]

Answer:

The Update statement in the DML is used for changing existing data in a table.

Explanation:

Their are following Sql statement in the DML.

Insert

This SQL statement is used for inserting data into the table.

select

This SQL statement is used for retrieving data from database  

update

This SQL statement is used for updating data in a table.

delete

This SQL statement is used for delete data from database .

The "UPDATE" SQL statement in DML is used for Modify the data in the existing table .

Following are the syntax of Update SQL query

Update tablename

set column1=value1,column2=value2............column N=valueN

Where condition;

Example :Suppose we have student table and (rollno,name,age and add) are the field for that table we have to change the address of rollno 105

Then we use update query like that

UPDATE STUDENT

SET add='kalam nagar'

where rollno=105;

8 0
3 years ago
Read the statement and justify your answer. “ICT is important for every field.”
Alja [10]

Explanation:

ICT permeates all aspects of life, providing newer, better, and quicker ways for people to interact, network, seek help, gain access to information, and learn. Besides its presence everywhere, Information and Communication Technology has an immense economic significance.

4 0
3 years ago
Since all Java data types (numbers, strings, etc) can be represented as strings, the _______ format specifier can receive any ty
astra-53 [7]

In Java programming, the <u>%s</u> format specifier can receive any type of Java data.

<h3>The kinds of data type.</h3>

In Computer programming, there are five recognized data types and these include:

  • Integer type (int).
  • Character type (char).
  • Floating point type (float).
  • Boolean (bool)
  • String (str)

<h3>What is a string?</h3>

A string is a data type which is typically used for data values that comprises ordered sequences of characters.

In Java programming, strings can be used to represent all Java data types such as numbers, Boolean, strings, etc. Also, the <u>%s</u> format specifier can be used by a programmer or software developer to receive any type of Java data.

Read more on a string here: brainly.com/question/25619349

5 0
2 years ago
Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choo
stellarik [79]

Answer:

I would propose Comodo Firewall to my schoolmate. It is very easy to understand and have an appealing graphical UI. It gives the most significant level of security from dangers. It checks all the traffic going to the framework and leaving the framework. It quickly cautions you when there is any sort of suspicious action. There are no mind boggling design issues. It learns the conduct of the client to convey customized protection. It gives you the usefulness of Spyware filtering and infection checking in a single tick. There are a lot more functionalities that the firewall gives to its clients.

Explanation:

Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling.

I would propose Comodo Firewall to my schoolmate. It is very easy to understand and have an appealing graphical UI. It gives the most significant level of security from dangers. It checks all the traffic going to the framework and leaving the framework. It quickly cautions you when there is any sort of suspicious action. There are no mind boggling design issues. It learns the conduct of the client to convey customized protection. It gives you the usefulness of Spyware filtering and infection checking in a single tick. There are a lot more functionalities that the firewall gives to its clients.

3 0
4 years ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • If you think a query is misspelled, which of the following should you do?
    15·1 answer
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • What is the difference between a workbook and a worksheet?
    14·2 answers
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • Explain software piracy and Hacking​
    13·2 answers
  • How to make a 'Sign in with replit' button in replit (Node.js) will make brainliest
    12·2 answers
  • Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more cle
    10·1 answer
  • Which of these technologies has been most used by terrorist organizations?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!