It should be, but sometimes it isn't. It depends on the website type you visit.
Answer:
The Anonymous Block will be:
1 DECLARE
2
3 lv_grade_row grade%rowtype;
4 lv_gr_avg grade.gr_t1%type;
5 lv_std_name varchar2(80);
6 cursor cursor_grade is select * from grade;
7
8 BEGIN
9
10 select avg(gr_t1) INTO lv_gr_avg from grade;
11 open cursor_grade;
12 fetch cursor_grade INTO lv_grade_row;
13
14 while cursor_grade%found loop
15
16 if
17 lv_grade_row.gr_t1>lv_gr_avg then lv_std_name :=
lv_grade_row.std_fname|| ' ' ||lv_grade_row.std_lname|| ' ' ||
lv_grade_row.gr_t1;
18 dbms_output.put_line(lv_std_name);
19
20 end if;
21 fetch cursor_grade into lv_grade_row;
22
Explanation:
Answer:
b. Application software
Explanation:
Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.
Examples:
Microsoft Office Word, Excel, Powerpoint
i think i did that right:)
Answer:
It's to prove and/or document that the account balance shown in the internal files of the company is correct, using external data sources (like bank statements for example).
That way, you reconcile two versions of the reality to make sure you are telling the same story.
Once the account has been reconciled (usually by an external party), you can use it confidently in your decision making process or share it with other parties (like banks, governments, partners, and so on).
Answer:
Public key encryption
Explanation:
DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.