1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
3 years ago
15

What is most likely kept in as database

Computers and Technology
1 answer:
belka [17]3 years ago
4 0
Sales reports,employee records,logged passwords   somebody has already asked this question
You might be interested in
Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
Vedmedyk [2.9K]

Answer:

The answer is "\bold{2^n\ \  _{where} \ \ \ n \ is\ bit }"

Explanation:

The Combinations could be produced by using n-bits 2^n . It s enables you to generate the 4-bit numbers that are:

\to  2^4 = 16 combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

7 0
3 years ago
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
3 years ago
Read 2 more answers
Which option allows users to access the handout master to modify it?
leonid [27]

Answer:

b

Explanation:

im the goat

3 0
3 years ago
Read 2 more answers
When would you use the code snippet American?
Olin [163]

I believe the answer is A. While inserting a checkbox

3 0
4 years ago
Read 2 more answers
Design and code a Swing GUI to translate text that is input in english into pig latin. You can assume that the sentence contains
Whitepunk [10]

Answer:

Code given below

Explanation:

import javax.swing.*;

import java.util.*;

import java.awt.*;

import java.awt.event.*;

public class PigLatin extends JFrame

{

private JLabel prompt;

private JTextField input;

private JTextArea output;

private int count;

public PigLatin()

{

super( "Pig Latin Generator" );

prompt = new JLabel( "Enter English phrase:" );

input = new JTextField( 30 );

input.addActionListener(

new ActionListener() {

public void actionPerformed( ActionEvent e )

{

String s = e.getActionCommand().toString();

StringTokenizer tokens = new StringTokenizer( s );

count = tokens.countTokens();

while ( tokens.hasMoreTokens() ) {

count--;

printLatinWord( tokens.nextToken() );

}

}

}

);

output = new JTextArea( 10, 30 );

output.setEditable( false );

Container c = getContentPane();

c.setLayout( new FlowLayout() );

c.add( prompt );

c.add( input );

c.add( output );

setSize( 500, 150 );

show();

}

private void printLatinWord( String token )

{

char letters[] = token.toCharArray();

StringBuffer schweinLatein = new StringBuffer();

schweinLatein.append( letters, 1, letters.length - 1 ) ;

schweinLatein.append( Character.toLowerCase( letters[ 0 ] ) );

schweinLatein.append( "ay" );

output.append( schweinLatein.toString() + " " );

if ( count == 0 )

output.append( "\n" );

}

public static void main( String args[] )

{

PigLatin app = new PigLatin();

app.addWindowListener(

new WindowAdapter() {

public void windowClosing( WindowEvent e )

{

System.exit( 0 );

}

}

);

}

}

5 0
4 years ago
Other questions:
  • An example of software is
    9·2 answers
  • What is a different paragph formatting tools
    6·1 answer
  • Gathering information with your eyes is called
    13·2 answers
  • How many words fit on a double-spaced page?
    11·1 answer
  • &gt;&gt;&gt; from hog import *
    15·1 answer
  • Sensing that the future of computing was in personal computers and that computers' power would reside not in their size but in t
    5·1 answer
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • The rhythmic note that three beats is called a____half note.
    15·2 answers
  • Which of the following is a true statement about parameters in data management? Check all that apply.
    11·1 answer
  • Think about a good game story that made you feel a mix of positive and negative emotions. What was the story, what emotions did
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!