1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
3 years ago
8

Give two examples of a large databases that might be used to help members of the public

Computers and Technology
1 answer:
frutty [35]3 years ago
8 0

Answer:

Examples of large database that might be used to help members of the public are;

1) Apple Healthkit, Carekit and Researchkit

2) IBM Deep Thunder

Explanation:

1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records

2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.

You might be interested in
What type of memory or storage device is prone to losing data if the power goes out?
Veseljchak [2.6K]
The answer is (c.) a DDR SDRAM module.

DDR SDRAM stands for Double data rate synchronous dynamic random-access memory. It is a form of temporary data storage in a computer. So when it comes to power down, the data stored in this RAM is most likely to lose.
7 0
3 years ago
By applying styles, _______ formats are being applied each time. A. various B. different C. the same D. similar
Dmitry [639]
I just took the test on (PF) it's C. the same

i hope this helped someone.
;-)
4 0
4 years ago
Read 2 more answers
The IPv4 address scheme has enough IP addresses to give every blade of glass in the world its own unique IP. True False
Andrew [12]

Answer:

False

Explanation:

IPv4 address are composed of four octets (8 bit numbers), ranging from <em>0.0.0.0 to 255.255.255.255</em>

All those 32 bits, in decimal notation, can form a total of

2^{32} = 4,294,967,296 different addresses.

Being more than 4 billion addresses and ignoring that some addressesare reserved for special uses, even present human population almost doubles that number.

So it is safe to state that IPv4 addresses is <u>not </u>enough to give every blade of grass its own IP.

8 0
3 years ago
You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
Ivan

Answer:

Option B (Static NAT) would be the correct choice.

Explanation:

  • Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address.
  • Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.

Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.

8 0
3 years ago
g Write a C program that prompts the user for a string of, up to 50, characters and numbers. It can accept white spaces and tabs
Pavel [41]

Answer:

Following are the code to this question:

#include <stdio.h> //defining header file

#include <string.h>//defining header file

int main()//defining main method

{

char name[50]; //defining character variable

int A=0,E=0,I=0,O=0,U=0,value=0,i,l; //defining integer variables

printf("Enter string value: ");//print message

gets(name);//input value by gets method

l=strlen(name);//defining l variable to store string length

for(i=0; i<50; i++) //defining loop to count vowels value

{

if(name[i] == 'A' || name[i] == 'a') //defining if condition count A value A++;//increment value by 1

else if(name[i] == 'E' || name[i] == 'e')//defining else if condition count E value

E++;//increment value by 1

else if(name[i] == 'I' || name[i] == 'i') //defining else if condition count I value

I++;//increment value by 1

else if(name[i] == 'O' || name[i]== 'o') //defining else if condition count O value

O++;//increment value by 1

else if(name[i] == 'U' || name[i] == 'u')//defining else if condition count U value

U++;//increment value by 1

else if(name[i]>= '0' && name[i] <= '9')//defining else if condition count digits value

value++;//increment value by 1 }

printf("A: %d\n",A);//print A value

printf("E: %d\n",E); //print E value

printf("I: %d\n",I);//print I value

printf("O: %d\n",O);//print O value

printf("U: %d\n",U);//print U value

printf("value: %d",value);//print digits value

return 0;

}

Output:

please find the attachment.

Explanation:

  • In the above code, a char array "name" and integer variables "A, E, I, O, U, i, value and l" declared, in which name array store 50 character value, which uses the gets function to take string value.after input value strlen method is used to store the length of the input string in l variable.
  • In the next step, for loop is declared that uses multiple conditional statements to counts vowels and the values of the digits,if it is more then one it increments its value and at the last print method is used to print its count's value.

7 0
3 years ago
Other questions:
  • Instructions:Select the correct answer.
    8·1 answer
  • Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshoo
    7·1 answer
  • An organization has a datacenter that processes highly sensitive information and is staffed 24 hours a day. The datacenter inclu
    12·1 answer
  • Discuss how does a Modulus Operator function
    7·1 answer
  • What is the most efficient way to prevent the spelling checker from repeatedly flagging a correctly spelled name in all of your
    5·1 answer
  • What are 3 important reasons to reconcile bank and credit card accounts at set dates?
    15·1 answer
  • GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trade
    7·1 answer
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
  • Write any two rules for writing algorithm​
    10·1 answer
  • Which two statements describe features of an ipv4 routing table on a router? (choose two.)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!