1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
4 years ago
11

Why do we use visual basic

Computers and Technology
1 answer:
igomit [66]4 years ago
8 0
Visual Basic is a programming language that allows you to write software. In this context you would use Visual Basic to produce software. However I don't know why you would want to use Visual Basic, there are many better languages.
You might be interested in
Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
mixas84 [53]

Explanation:

 The term IT infrastructure refer to an enterprise which is basically a collection of various hardware, software, network components, data network and data centers that are being used to do some development, testing related to IT related services. So the major components of IT infrastructure are:

1) Hardware solutions

2) Software Solutions

3) Various Network Component

4) Data Centers

Business Intelligence is basically a technology driven process that is being used analyze various data and the information in more effective and more informed way. The role of business Intelligence is given in following points:

1) Business Intelligence plays a vital role in identifying the technology required for our business.

2) As we knew that Business Intelligence is technology driven, so technology identification is major part that is being done my this process

3) With business Intelligence we chose the best technology required for our business, its help in increasing the profit of the business.

4) We can business Intelligence is the major process that deal with identifying all the technology needs of the business

8 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
Which term refers to actions that you would typically perform on a computer to revive it even if it functions in an unexpected m
sweet-ann [11.9K]
You'd usually reboot a PC if it malfunctions.
6 0
3 years ago
Which of the following technologies is the best choice to convey urgent and highly sensitive information? telephone fax letter e
snow_lady [41]
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
3 0
3 years ago
Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
Rudiy27

Answer:

All of this above.

Explanation:

All the mentioned practices can be use to prevent breaches.

6 0
3 years ago
Other questions:
  • Web services can exchange information between two different systems only if the operating systems and programming languages upon
    10·1 answer
  • To create a formula, click the cell where you want to add the formula and press the _____ key.
    10·2 answers
  • ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
    11·1 answer
  • True or false?
    12·1 answer
  • Give your definition of a view. Based on the Academic Database, identify and describe a scenario where it would be necessary to
    10·1 answer
  • Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are
    7·1 answer
  • What is the disadvantage of server based network?
    7·2 answers
  • Which of the following statements are true of
    14·1 answer
  • 1k bits equals to how many bits
    12·1 answer
  • Explain Http and Ftp​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!