1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
5

The records in a database table are generally visualized as​ ________.

Computers and Technology
1 answer:
vekshin13 years ago
5 0
The records in a database table are generally visualized as rows

Rows should be the answer 
You might be interested in
You are creating a web page as part of a science project. Your role is to put your data on the webpage. You tracked the growth o
zysi [14]

The best way to represent this information on a web page is to put it on a table. I would use the <table> tag to create the table element. The <tr> tag for creating a series of row elements, the <td> tag to create cell divisions and the <br> tag for a line break.

I would use 10 rows for different plants and 8 columns for different points in time.

<em>Hope this helps :)</em>

7 0
2 years ago
Read 2 more answers
Consider an improved version of the Vigen ere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic su
anzhelika [568]

Answer:

Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.

Explanation:

Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.

The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.

6 0
4 years ago
Print even numbers till 50 in python coding.
e-lub [12.9K]

In python, you can use a simple list comprehension to solve this problem.

print([x for x in range(51) if x % 2 == 0])

This code prints all the even numbers from 0 to 50 including 0 and 50.

4 0
3 years ago
Select the processes that help to create a program.
Marina86 [1]

Debugging ..............

4 0
3 years ago
Install hardware, install software, and convert data are the three steps found in the _____. Select one:
aev [14]

Answer:b)Conversion plan.

Explanation:Conversion plan is type of plan in which the the technique is followed by converting the data from the present system to another system's hardware and software surroundings.

The technique follows three basic steps in the conversion plan is software installation plan, hardware installation plan and conversion of data. Thus the correct option is option(b).

3 0
4 years ago
Other questions:
  • What is an advantage of taking notes in a digital format?
    6·2 answers
  • You are attempting to open a file containing a list of integer numbers, each on a separate line, and read them into Python as in
    6·1 answer
  • Ok so another weird question! So if you know what google drive is and how to upload a video why does it keep adding hours! it ke
    11·1 answer
  • Lean production systems are sometimes referred to as pull systems because demand from customers activates the production actions
    5·1 answer
  • Who needs to be involved when assembling business solutions that include hardware and software?
    11·2 answers
  • Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
    15·1 answer
  • Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
    9·1 answer
  • In 2 or 3 sentences, describe one advanced stradegy and how its useful
    11·1 answer
  • How does segmenting your network increase network security?
    8·1 answer
  • What is the device that is non-volatile sometime called external memory?<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!