1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
3 years ago
10

12. Which one of the following items would you be most likely to keep in a database?

Computers and Technology
1 answer:
AysviL [449]3 years ago
3 0
The item that would be most likely to keep in a database would be the payroll records. The other items such as address book, financial statements and sales reports would not necessarily be placed in a database.

The answer would be letter A. 
You might be interested in
The _____ method of developing systems produces code that is modular and reusable.
Ymorist [56]

The object-oriented analysis method of developing systems produces code that is modular and reusable.

<h3>What is object oriented system analysis?</h3>

Object-oriented systems analysis and specification (OSA) is known to be a kind of a method that is often used in regards to systems analysis and this is known to be one that helps to create or builds on the strengths of former systems and, at also at the same time, look into their weaknesses.

Note that this is said to be the basic idea behind the OSA methodology that are known to be described. The framework of OSA system models is known to be object class.

Hence, The object-oriented analysis method of developing systems produces code that is modular and reusable.

Learn more about object-oriented  tool from

brainly.com/question/11158544

#SPJ1

8 0
2 years ago
Is there such a thing as an ethical reason for unauthorized access to a computer system?
OLga [1]

Meaning of key word here is "unauthorized": We don't have access to use the system. But you are try to accessing an Unauthorized system which is illegal, can be ethical. I think, although not legal in point of where you have to decide of right and wrong. Like if you want to getting information from criminals personal file to catch him then i would be right.

Yes if an administrator want to fix a problem something going on in his/her network wrong,then he/she can access the systems which is attached to network. Like if somebody is trying to access your's network or wifi getting password then you can stop to them use ethically,stop her/him system access to attaching your's network.

6 0
3 years ago
1. The _______ is the brain of the computer. It runs computer programs. (Select the best answer.)
Alexandra [31]
The CPU is the brain
8 0
3 years ago
Why is it important to use the binomial nomenclature system?
mr_godi [17]

Answer:

These names are important because they give room for people throughout the world to communicate unambiguously about animal species.

Explanation:

It was expidient to name animals, plants or any other living organisms in such a way to prevent any confusion which was initial problem. As a vegetable in different parts of one single country is has different names. Hence scientists concluded to use a single scientific name of Latin origin representing its features that would make anyone in any part of the world easily recognize the vegetable (any other living organism) without barrier of language or culture. This was made possible because of binomial nomenclature.

6 0
3 years ago
Before web browsers, the primary draw the internet held for the general public was_______
inessss [21]

Answer:

Email is the correct answer for the above question.

Explanation:

  • Email is a software application which is used to send the message to another person or two or more person in a single time with the help of internet.
  • The web browser is a software application which is used to use the website in computer or smartphones.
  • The email comes first in the comparison of a web browser because Email comes in 1969 and the web browser comes in 1990.
  • The above question asked about the software that comes before from the web browser. The answer is Email which is described above.
6 0
3 years ago
Other questions:
  • In order to allow communication between vlans for exchange of data what must be used?​
    15·1 answer
  • Drag each label to the correct image.
    9·2 answers
  • What is the cell membrane used for ​
    14·2 answers
  • Define get_date() function.
    6·1 answer
  • HAVE A GOOD WEEK OFF PPL
    13·1 answer
  • Discuss one simple example of hybrid computer.​
    15·1 answer
  • Choose the term that best matches the definition.
    9·1 answer
  • How to add links in HTML? ​
    8·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
  • Which operating system is used by most the supercomputer system in the world
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!