1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
6

A(n) ____ is the computer counterpart to an ordinary paper file you might keep in a file cabinet or an accounting ledger.a. data

base b. data filec. spreadsheet d. attribute
Computers and Technology
1 answer:
Free_Kalibri [48]3 years ago
6 0

Answer:

B) Data File

Explanation:

From the scenario given in the question above, an ordinary paper will contain some information and/or records (Data), and several such papers will be saved in a file cabinet or a ledger (a database). The ordinary paper is analogous to a data file in computing because data files are used to store data for the computer application or system, These data includes the input and output information. However, data files  usually contains no programming codes for execution.

You might be interested in
Given the list of customer segments below please create a new list of the names of the segments only using(a) a for loop(b) a li
Alchen [17]

Answer:

new_segment = [ ]

for segment in segments:

   new_segment.append({'name': segment, 'average_spend': money})

print( new_segment)

Using list comprehension:

new_segment =[{'name': segment, 'average_spend': money}  for segment in segments]

Using map():

def listing(a):

   contain =  {'name': segment, 'average_spend': money}

   return contain

new_segment = [ ]

new_segment.append(map( listing, segment))

print(list(new_segment)

Explanation:

The python codes above create a list of dictionaries in all instances using for loop, for loop in list comprehension and the map function which collect two arguments .

7 0
3 years ago
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
You create a computer-aided design database that stores data including a list of components of an item being designed, the relat
Leviafan [203]

Answer:

The correct answer is Multi-dimensional.

Explanation:

This database is optimized for online analytical processing and data warehousing (OLAP) applications. Multidimensional databases are often created using existing relational database records. While a relational database can be accessed through a Structured Query Language (SQL) query, a multi-dimensional database allows the user to ask questions like: "How many additives were sold in Nebraska in a year?" and similar issues related to the synthesis of operations and business trends. An OLAP application that accesses data from a multidimensional database is called a MOLAP application (Multidimensional OLAP).

3 0
3 years ago
Need help!! Write an interactive program that reads lines of input from the user and converts each line into "Pig Latin." Pig La
zepelin [54]

<span>user input a elit Interactive legentium lineae ad lineam convertit et "Sus
</span>
6 0
3 years ago
What is the best plugin for subscription sites?
Gnom [1K]

Answer:

Explanation:

MemberPress. MemberPress is a popular & well-supported membership plugin. ...

Restrict Content Pro. ...

Paid Memberships Pro. ...

Paid Member Subscriptions. ...

MemberMouse. ...

iThemes Exchange Membership Add-on. ...

Magic Members. ...

s2Member.

6 0
3 years ago
Other questions:
  • Craig's annual take-home pay is $75,000. What is the maximum amount that he can spend per month paying off credit cards and loan
    7·2 answers
  • Which keyboard feature is a form feed character?
    15·1 answer
  • ____ languages create source code using words and structures similar to spoken language.​
    15·1 answer
  • Which does plug-and-play refer to?
    13·2 answers
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • Click to visit W3Schools.com
    14·2 answers
  • Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
    6·1 answer
  • When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible doma
    12·1 answer
  • Which of the following is not a storage medium?
    14·2 answers
  • The Jacquard Loom used ______________ to change the operation of the loom.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!