1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
3 years ago
14

Which of the following statements is true of a database? a. It is a collection of unstructured data. b. It is accessed primarily

for use by an organization’s database administrator and data administrator. c. It provides an essential foundation for an organization’s knowledge management and artificial intelligence systems. d. It helps companies analyze information to open new market opportunities.
Computers and Technology
1 answer:
Sergeeva-Olga [200]3 years ago
7 0

Answer:

D or C, most probably D

Explanation:

You might be interested in
How many bytes are in a megabyte?
Ivenika [448]
1,000,000 bytes are in 1 megabyte.
4 0
3 years ago
Read 2 more answers
Which of the following statements is true of subroutines? Check all that apply.
erica [24]
I believe it’s the first answer

“They can be used in multiple places “

But I’m not sure!!
6 0
3 years ago
Read 2 more answers
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
tester [92]

Answer:

A developer wants to take existing code written by another person and add some features specific to their needs.

Explanation:

pls Mark as Brain list

3 0
3 years ago
A Python data model defining the state of a game for Tic-Tac-Toe. You must fully describe the notion of a state of the game, lim
Artist 52 [7]

Answer:

Check the explanation

Explanation:

Here in this game of Tic-Tac-Toe, it is using the TPGE engine which is a Tiny Python Game Engine. Let's talk about its functions like:-

def image_type(img): In this function, it is simply taking image as a parameter and returning its object type like DISC if the image is in graphical form, TEXT if it is a string, and LINE if it is other than the mentioned object.

def convert_image(img):  In this function, it is simply taking image as a parameter and returning an equivalent graphical object as understood by John Zelle's. Mainly comparing for three things in this function and those are: if image equals to DISC then it is calling convert_circle(function), if image equals to LINE then it is calling convert_line(function), and if image equals to TEXT then it is calling convert_text(function),

def convert_circle(x): This function takes a list( a group of values) and makes a circle at the center of the window and the circle's radius is coming from the list.

convert_text, convert_line, convert_circle are only creating text, line, and circle and then returning it.

def graphical_elements(images): This function is taking image as a parameter and then extracting shape and color from the image and then calling convert_image(shape) and convert_type(shape) and it gives us graphic and kind respectively. Now it is checking whether kind equals to DISC If yes then filling color on the window else, setting the outline of the window

def run(): Here it is finally running the game with required parameters, the whole game is continously running under the while loop.

That's all

8 0
4 years ago
g A user receives an email from an unknown source with a link to a website asking for their password. The userenters in their pa
SCORPION-xisa [38]

Based on the information provided, this user is a victim of phishing.

<h3>What is phishing?</h3>

Phishing can be defined as a type of cyberattack which involves making an attempt to obtain sensitive user information such as a password, especially by disguising as a trustworthy entity in an electronic communication (email), which is usually over the Internet.

In this context, we can infer and logically deduce that this user is a victim of phishing because he or she received an email from an unknown source with a link to a website asking for their password.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

5 0
2 years ago
Other questions:
  • What is the output of the loop for count in range(5): print(count)?
    6·1 answer
  • What are the four basic operating principles of the information processing cycle?
    7·2 answers
  • Write a recursive program that requests an answer to the question "Are we there yet?" using an input statement and terminates if
    10·1 answer
  • A file containing user information which is transmitted from an online server and attached to your web browser and stored on you
    11·1 answer
  • How to upgrade from office home to office professional
    13·1 answer
  • In Windows applications, a ____ control is commonly used to perform an immediate action when clicked.a. text boxb. buttonc. wind
    7·1 answer
  • What would be the desired output of the home-security system
    8·1 answer
  • Evaluate the following expression: <br> 12+(2**4-5)/2Required to answer. Single choice.
    10·1 answer
  • 52. An assignment statement will:
    11·2 answers
  • If you want to change your system settings, what should you use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!