1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
4 years ago
5

Fundamental types of data, such as strings, integers, and real numbers, are known as

Computers and Technology
1 answer:
alina1380 [7]4 years ago
4 0

Solution:

Fundamental types of data, such as strings, integers, and real numbers, are known as primative data type.

Primitive data structures are char, int, float, double. ... There comes derived data structures and user defined data structures. Derived data structures are also provided by the system but are made using premitives like an array, a derived data. It can be array of chars, array of ints.

Thus the right answer is primative data type.

You might be interested in
8. This machine is used for high speed, high volume printing l. Can print about 1000 papers at one point in time.
seropon [69]

Answer:

Risographs can produce up to typically 150 pages per minute. So I'm guessing its c.

Explanation:

5 0
3 years ago
What special identity group is typically used when a user accesses an FTP server that doesn't require user account logon?
Rainbow [258]

Answer:

The correct answer to the following question will be "​Anonymous logon".

Explanation:

  • Windows would never let anyone sign in interactively with an anonymous logon to the device, a person who has linked to the device without a login and password being given.
  • So they won't have to verify to an account of the user just whether you are running any shares.r document, let everyone log into the machine collaboratively with such a logon.

Therefore, Anonymous logon is the right answer.

4 0
4 years ago
George wants to edit the font of the title in his presentation. Where can he find the option to edit it?
Bad White [126]

The answer could be B. Tool Bar

6 0
3 years ago
Read 2 more answers
a network has been crashed to the point where all activities are critical. additional crashing: group of answer choices is unnec
Lunna [17]

Option D is correct. Project managers and stakeholders often use the project management technique of "crashing" to deal with emerging problems.

By allocating more resources where they are most needed, project crashing maintains or accelerates a project's scope and timeline. Crashing is a compression approach that focuses on the project timetable to hasten the project's completion date. Here are some plausible instances of crashing: Over-time. adding more resources to a particular activity. Crashing is the process of reducing the length of time it takes to complete a project by changing its scope or adding resources. Fast-tracking, which involves adjusting project activities so that they are completed in parallel and with less time spent, is typically the first option when a project's production duration needs to be shortened.

Learn more about crashing here-

brainly.com/question/4701800

#SPJ4

3 0
1 year ago
TCO B) Which of the following is a correct statement? (Points : 8)
melamori03 [73]
The first one, "<span>A </span>SYN flood<span> is a form of denial-of-service attack in which an attacker sends a succession of </span>SYN<span> requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic." </span>
5 0
3 years ago
Other questions:
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • What are the possible sources of the information that defines the functional dependencies that hold among the attributes of a re
    15·1 answer
  • As a member of the accounting group,
    10·1 answer
  • Write a program which capitalize every character after full stopin a given sentence
    11·1 answer
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
    13·1 answer
  • Which of the following is the BEST solution to allow access to private resources from the internet?
    9·1 answer
  • Giving brainliest if you answer question.
    8·1 answer
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • How do I give Brainliest?? I'll give brainliest...
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!