1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
3 years ago
6

West Point Bridge Designer | Does anyone know a way to make this bridge cost less?

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
4 0
Make the zig zag part more spaced out
You might be interested in
the 4gl languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a dat
Mademuasel [1]

The 4gl languages that enable non-programmers to use certain easily understood commands to search and generate reports from a database are called <u>query</u>.

<h3>What is 4gl?</h3>

A computer programming language that is part of a class that is intended to improve upon third-generation programming languages (3GL) is known as a fourth-generation programming language (or 4GL).

Every generation of programming language strives to provide a greater level of abstraction of the internal workings of the computer hardware, making the language more user-friendly, potent, and adaptable.

Despite the fact that the definition of 4GL has evolved over time, it can still be characterized by the fact that it works more with large groups of data at once rather than concentrating on just bits and bytes.

The support for report generation, database management, mathematical optimization, GUI development, and web development may be found in languages that advertise themselves as 4GL. According to some academics, domain-specific languages include 4GLs as a subset.

Learn more about 4GL

brainly.com/question/9978575

#SPJ4

3 0
1 year ago
The ________letter of the first word in the Complimentary Closing has a capital letter, everything else is keyed in lower case o
Alona [7]

Answer: enter

\

Explanation:

yes

5 0
3 years ago
In a relational database application, a(n) ________ key is used to link one table with another.
mr_godi [17]

In a relational database application, a <u>foreign key</u> is used to link one table with another.

<h3>What is a foreign key?</h3>

In database management system (DBMS), a foreign key can be defined as a column whose value provides a link between the data that are stored in a table or relational database.

This ultimately implies that, a <u>foreign key</u> is used to link one table with another in a relational database application.

Read more on keys here: brainly.com/question/8131854

#SPJ12

6 0
2 years ago
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
Does anyone know the answers to the AR test on Gathering Blue by Lois Lowery?
Ede4ka [16]

yes i do....................................................

6 0
3 years ago
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit. Write a program that will help
    6·1 answer
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    8·2 answers
  • A drop-down menu must be contained by
    5·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • Which option nukes your systemâall apps, programs, user files, user settingsâand presents a fresh installation of Windows?
    13·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • Discuss briefly four types of websites and the criteria you will use to evaluate the content of a website
    8·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • What is the optimal number of members for an Agile team?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!