1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korolek [52]
3 years ago
13

Fill in the blank

Computers and Technology
2 answers:
EastWind [94]3 years ago
7 0

Answer:

It is called the ENQUIRE database

Explanation: got it right boooiiiii

vivado [14]3 years ago
6 0

Answer:

the ENQUIRE database

Explanation:

it was the processor for the world wide web, It was a simple hypertext program.

You might be interested in
A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
Alinara [238K]
A1 is 10, so your answer is 10+2=12
B. 12
6 0
3 years ago
Read 2 more answers
Suppose you have the following declaration.int[] beta = new int[50];Which of the following is a valid element of beta.(i) beta[0
kompoz [17]

Answer:

The answer is "Option (i)".

Explanation:

  • In the given question, an array is defined. It is a collection of the same type of data element, which means, array stores either a numeric value or string value at a time.  
  • An array beta is defined, which contains 50 elements. The array elements indexing always starts with 0 which means, the first element of the array will be stored in an index value that is 0. That's why option (i) is correct.
8 0
3 years ago
Computers influenced the outcome of world war 2 by?
Elan Coil [88]

Answer:

Computers were introduced to the U.S. Navy on the eve of war for submarines. The computers used trigonometry to help the submariners know when to fire their torpedoes at a moving target. These devices were expanded to surface ships to provide more accurate firing of the guns.

Explanation:

3 0
2 years ago
Malware that is spread through security warnings or advertisements for antivirus software is known as ______________.
Agata [3.3K]
This is known as "phishing"
7 0
3 years ago
Read 2 more answers
Assume your computer clock runs at the speed of 2.5 GHz (G=10^9).
azamat

Answer:

a) T=4*10^{-4}μs

b) N=2.5*10^6 cycles

c) 10000 programs.

Explanation:

a) We know that the frequency is the inverse of the period, so:

f=\frac{1}{T}\\\\T=\frac{1}{f}\\T=4*10^{-10}s

1μs is equal to 1*10^{-6}s

so T=4*10^{-4}us

b) If in a second there are 2.5*10^9 cycles:

N=2.5*10^9*(1*10^{-3})=2.5*10^6 cycles

c) we have to make a conversion, we know that a program takes 100*10^(-3) milliseconds, that is, 1*10^(-4) seconds so in 1 second we can execute:

P=\frac{1s}{1*10^{-4}s}=10000

10000 programs.

7 0
3 years ago
Other questions:
  • Which of the following statements is false? People tend to shortcut security procedures because the procedures are inconvenient.
    13·1 answer
  • Help pleaseeeeeeeeeeeee
    13·2 answers
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • 4.12 LAB: Using math methods Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to
    10·1 answer
  • Give me at least five main characteristic of irrigation equipment​
    8·1 answer
  • Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a d
    8·1 answer
  • What are the steps for inserting an internal link?
    15·2 answers
  • Chang investigates ways to improve the interactivity of computer hardware. His job title is best described as ✓ Computer and Inf
    14·1 answer
  • "Bookings are to be stored in three separate
    7·1 answer
  • Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!