1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
3 years ago
10

ICT excel data homework

Computers and Technology
1 answer:
kifflom [539]3 years ago
4 0
Static data field - the field is set at the start of the program (if creating a program) and can not be changed, its value will be constant. 
<span>Instance data field - can be manipulated by the user, so that its value can be stored: for example you have a data field storing how many hours a person can work in one day, the field will be static as there are always 24h in a day and that can not change. </span>
<span>If you have a second data field storing how many hours a certain employee worked that field will be an instance data field as its values can differ.</span>
You might be interested in
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
2 years ago
1. It is a requirement to install a routing protocol that monitors the network for routers that have changed their link state. T
Nady [450]

Answer:

1. Open Shortest Path First (OSPF)

2. Border Gateway Protocol (BGP)

3. Routing and Remote Access Service (RRAS)

4. Frame relay

5. Synchronous

6. Virtual

7. Committed Information Rate (CIR)

8. Integrated Services Digital Network (ISDN)

9. Asynchronous Transfer Mode (ATM)

10. Basic Rate Interface (BRI).

8 0
3 years ago
What command can you use if you accidentally delete a sentence in your document?
damaskus [11]

Answer:

undo

Explanation:

or ctrl z

hope this helps

6 0
2 years ago
Read 2 more answers
What is the error in the following pseudocode?
kykrilka [37]
I do not know the answers sorryy
4 0
2 years ago
Which information medium is used to access information from the Internet in the form of HTML pages?
enyata [817]

Answer:D

Explanation:

4 0
3 years ago
Other questions:
  • Which of the following statements about the FAFSA process are TRUE?
    6·1 answer
  • Assuming a computer has a single processor and a single core with no support for parallel execution, explain why running a multi
    11·1 answer
  • Which file type is typically used for videos? GIF MPEG MP3 PDF
    8·1 answer
  • In presentation software, what is the way that text and pictures are arranged on a page called?
    10·1 answer
  • Does anyone know the answers?
    8·1 answer
  • What does "CPU" stand for?
    15·2 answers
  • When does MMF2 inactivate an Active object? A. When the score is higher than the game's previous high score B. When the player d
    15·1 answer
  • Write a C++ function for the following:
    14·1 answer
  • In what ways can information be slanted in a news report? List at least five ways.
    5·2 answers
  • explain why you can determine machine epsilon on a computer using IEEE double precision and the IEEE Rounding to Nearest Rule by
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!