1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
3 years ago
15

Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.

Computers and Technology
1 answer:
Alexeev081 [22]3 years ago
5 0

cataloging is a term for that

You might be interested in
PLEASE HELP ASAP!!!!111 Read "Teenagers are rewriting the rules of the news" (find it somewhere and answer questions below)
Ilya [14]

Answer:

Sorry, we picked up your question late. There are a lot of questions, and every now and then some misses out. And I am sure you will understand. However, the cool thing is your answers are correct. I read the complete article on young adults or teenagers and found the same. And I am sure you will agree with the facts, and use its best meaning in your own life. I am, however, listing below all the answers for your complete satisfaction. And I congratulate you, you are up with the correct list of answers.

The answer to the First question is:

B. the description of how influencers follow young social media users"

Second question answer is

C. Andrew Yang

And the third question answer is:

C. Teens and young adults consume and spread news information through social media.

And I am sure you must have liked this article. Article reading is a good habit. You should always start a day by reading one article online or in newspaper.

Explanation:

Please check the answer section.+

4 0
3 years ago
Which of the following behaviors does not harm a company if your employment is terminated?
saul85 [17]

Answer:

D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Explanation:

Assuming your employment is terminated, notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave is a behavior that would not harm a company. In the true and actual sense, making such suggestions is commendable because it would go a long way to cause more good rather than harm the company.

Some mischievous and malicious employees would rather not tell so they can still have an unauthorized access to the company's account and perpetrate various level of evil.

Hence, it is a good global practice to have a company's login credentials updated whenever an employee's employment is terminated.

3 0
3 years ago
For this exercise, you are going to write your code in the FormFill class instead of the main method. The code is the same as if
LiRa [457]

Answer:

  • Explanation:How many grams are in 5.4 moles of iron (III) sulfate, Fe2(SO4)3?<u>⇔⇔∉↑·</u><em><u>ПНПёП</u></em><u>сж</u>

ЫЫЫЁ

Explanation:

  • Explanation:How many grams are in 5.4 moles of iron (III) sulfate, Fe2(SO4)3?<u>⇔⇔∉↑·</u><em><u>ПНПёП</u></em><u>сж</u>

ЫЫЫЁ

7 0
3 years ago
Write the code to call a CSS file named "exam.css".
katen-ka-za [31]

Answer:

 <link rel="stylesheet" href="exam.css">

Explanation:

href is the file name assuming its in the same path

also get an extension called grepper, it helps debug a lot quicker

7 0
2 years ago
Read 2 more answers
private int product(int n) { if(n &lt;= 1) return 1; else return n * product(n-2); } What is the output when product(6) is calle
sergeinik [125]

Answer:

48

Explanation:

In this code, there is a method i.e "product" of "int" type it means it returns the integer value. The description of the given code is given below

  • Initially when product(6) function is called the else block will be executed so return(6)*product(4).
  • As we saw that above product(4) is a recursion function " Function which calls itself again and again " . so again else block is executed now the value is return(6)*return(4) *return(2);

So it returns 48

7 0
3 years ago
Other questions:
  • Fluyen en tecnologia
    15·1 answer
  • What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
    14·1 answer
  • Sending an e-mail message to customers or potential customers of a legitimate website asking them to click a link that leads to
    10·1 answer
  • You need a collection to represent secret agents. Every agent has a unique codename that identifies them, and an Agent object th
    14·1 answer
  • Write a program that includes functions to calculate feet to inches, inches to feet, feet to yards, and yards to feet. Then, acc
    9·2 answers
  • How is communication within healthcare different than communication within other industries ?
    13·1 answer
  • Convert the following denary numbers into
    14·1 answer
  • Which term describes a number in base 16, using the digits from zero to nine along with A, B, C, D, E, and
    9·1 answer
  • What triggers a LinkedIn account ban?
    6·1 answer
  • What do the last two steps in the cyclical design process most likely involve
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!