1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
4 years ago
15

Which example can be considered master data in an organization?

Computers and Technology
1 answer:
Svetradugi [14.3K]4 years ago
3 0
Employee information can be considered master data in an organization
You might be interested in
3. Which of the following is most likely fake news?
ahrayia [7]

Answer:

C. An article that tries to sell you miracle weight loss pills

7 0
3 years ago
Descending selection sort with output during execution
FromTheMoon [43]

Answer:

Check the explanation

Explanation:

Please find the code down

def selection_sort_descend_trace(numbers):

i=len(numbers)

print("Output: ")

for num in range(0,i-1):# traversing from 0 to N-2, total N-1 iterations

val=numbers[num]

start=num+1

end=i

t=0

for j in range(start,end):

if(val<numbers[j]):

remember=j

val=numbers[j]

t=1

if(t==1):# swaping onlf if greater number is available

temp=numbers[num]

numbers[num]=val

numbers[remember]=temp

for p in range(i):# printing

print(numbers[p],end=' ')

print("\n")

if __name__ == "__main__":

print("Enter the integers separated by space: ")

numbers=[int(x) for x in input().split(' ')]

selection_sort_descend_trace(numbers)

Taking input as string and splitting with space as delimiter , converting the split part to integer , finally append in the list.

3 0
4 years ago
When using SSH to remotely access a Cisco router, can you see the terminal password?
viva [34]

Answer:

No, you can't.

Explanation:

SSH is an acronym for Secure Socket Shell and is a networking protocol used for providing remote authentication through a public-key cryptography over an unsecured network such as the internet.

Hence, it is a network protocol that is commonly implemented by using a client-server model; where a computer acts as a SSH client while the other network device acts as the host or SSH server.

When using SSH to remotely access a Cisco router, you cannot see the terminal password because it is Linux based and encrypted through the use of symmetrical encryption, asymmetrical encryption or hashing

5 0
3 years ago
Which response best completes the following IF-ELSE statement?
nignag [31]
100 is the best guess I have sorry if it doesn’t help
5 0
2 years ago
Which way is the quickest to access the Find and Replace dialog box?
Marizza181 [45]

Answer:

Ctrl+H

Explanation:

Have a great day.

6 0
4 years ago
Read 2 more answers
Other questions:
  • A major software corporation has decided that its operating system is too difficult for the average user. Who should they hire t
    12·1 answer
  • Consider a network of 8 routers connected together to provide more than one path of connectivity between host A and host B at tw
    8·1 answer
  • Project using simple formulas
    15·1 answer
  • Manipulating graphic images to perform a command has replaced the ____ user interface.
    8·1 answer
  • Why did they removed the watch video button to view answers?​
    15·1 answer
  • ________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate progr
    5·1 answer
  • Can you help me with these AP Computer Science Questions. (THIS IS DUE BY 1:30 PM today) you have to evaluate the Boolean Expres
    10·1 answer
  • Write the steps involving coping and pasting a file in a folder​
    5·1 answer
  • Order the steps for creating an automatic reply in Outlook.
    13·2 answers
  • help this poped up on my pc im on my laptop what does it mean HELP rC % M i \g e - A u t o M e r g e d - b a s e ~ 3 1 b f 3 8 5
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!