1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
6

________ databases are the most commonly used electronic databases. multidimensional object-oriented relational flat-file

Computers and Technology
1 answer:
Maurinko [17]3 years ago
3 0
O
I would say a SQL database
You might be interested in
When you started the vi editor, you forgot to specify the name for the new file you are creating. To save steps next time, how c
zysi [14]
Vi ‘filename’
For example file called main.py
vi main.py
8 0
3 years ago
Def find_max(nums: [int]) -> int:
SIZIF [17.4K]

Answer:

The program in recursion is:

def find_max(nums):

    if len(nums) == 0:

         return "None"

    elif len(nums) == 1:

         return nums[0]

    else:

         return max(nums[0],find_max(nums[1:]))

Explanation:

This line defines the function

def find_max(nums):

This checks if the list is empty.

    if len(nums) == 0:

If yes, it returns "None"

         return "None"

If the list has just one element

    elif len(nums) == 1:

It returns the only element as the maximum

         return nums[0]

If the list has numerous elemente

    else:

The maximum is determined recursively

         return max(nums[0],find_max(nums[1:]))

To the (b) part:

<em>This program does not necessarily need to be done recursively because the max built-in function can be used to determine the maximum of the list in just one line of code and it is more efficient.</em>

8 0
3 years ago
What is the term for water wave that is created by an underwater earthquake
Mashutka [201]
A tsunami/tidal wave is a huge wave caused by an earthquake.
7 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
This activity will help you meet these educational goals:
nirvana33 [79]

Answer:

you are doing research for configuration processors.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Computers have become easier to use and more powerful over time.
    12·2 answers
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • What are the considerations that go into representing information digitally? What are the trade-offs? What’s easy? What’s hard?
    13·1 answer
  • What Is one reason that more personal computers have windows operating systems as opposed to Mac operating systems
    7·2 answers
  • What is software and explain the five types of software
    5·2 answers
  • 4.2 Code Practice: Question 2​
    14·1 answer
  • What's the best definition of financial literacy?
    10·1 answer
  • Drag each tile to the correct box. (No links please)
    8·2 answers
  • Topic: Video Games
    15·1 answer
  • Which terms would be found in search for "Mo*”? Check all that apply.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!