1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
13

Type the correct answer in the blank. Spell all words correctly.

Computers and Technology
1 answer:
Mademuasel [1]3 years ago
8 0

Answer:

Database

Explanation:

Once you make a change to the database it will offset the program, which will change your slides.

You might be interested in
Which of the following film pioneers helped make films widely available to ordinary people?
Verizon [17]
<span>Steven Spielberg, and or Paul Williams

</span>
6 0
3 years ago
Read 2 more answers
All of the following are advantages of database-stored information, except: Question 3 options: 1) Reduced information redundanc
enot [183]

Answer:

3) Reduced information integrity.

Explanation:

This is not an advantage, Information integrity is a key factor when storing information on a database. As multiple users will access it, they will need this data to be authentic and dependable. Any reduction in information integrity is a great disadvantage.

5 0
3 years ago
What are general purpose computer and special purpose computer?​
icang [17]

Answer:

General purpose computers are designed to be able to perform variety of tasks when loaded with appropriate programs, while special purpose computers are designed to accomplish a single task.

3 0
3 years ago
Read 2 more answers
What groups have developed electrode idenfication systems?
Basile [38]

CH24. CH25. CH26. CH27. CH28. CH29. CH30. CH31.

5 0
4 years ago
Who are the four main antagonists in fnaf 1
ikadub [295]

Answer:

lol it's foxy freddy bonnie and chica

5 0
3 years ago
Read 2 more answers
Other questions:
  • Your client expresses that they want their new website to have a responsivedesign with consistent coding. They are concerned wit
    5·1 answer
  • Which layer of the osi model defines services to segment and reassemble data for individual communications between end devices?
    15·1 answer
  • A ______ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
    12·2 answers
  • You can use the windows ________ to check on a nonresponsive program
    12·1 answer
  • Which of the following will increase the level of security for personal and confidential information on a mobile device if the d
    14·1 answer
  • If the code for JAVA is LCXC, what is the code for BASIC?
    12·1 answer
  • The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an opera
    9·1 answer
  • Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con
    11·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!