1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
3 years ago
10

Write a paragraph expressing how you'd use the computer to enhance your place of work.​

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
4 0

Answer:

Have water by, have it organized, and have notes by you welcome.

Explanation:

You might be interested in
Which of the following is the term for software that automatically displays or downloads unwanted offers?
slega [8]
Adware. Adware displays ads and popups. The other options are completely different from each other
5 0
3 years ago
_____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it
babymother [125]

Answer:

Case-based reasoning.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. It is typically based on cognitive science and artificial intelligence.

7 0
3 years ago
What are the values of the digital signal when sending in physical layer?
irina [24]

Answer:

A waveform that switches representing the two states of a Boolean value (0 and 1, or low and high, or false and true) is referred to as a digital signal or logic signal or binary signal when it is interpreted in terms of only two possible digits.

8 0
2 years ago
PLEASE HELP ME!!!!!
gizmo_the_mogwai [7]

Answer:

Unicode

Explanation:

This is a fairly large code and Is well known throughout my family since we study ancient codex and modern codes to solve crimes and find relics of the past, although our research has proven good and unicode is one that is being studied currently now, I have found it as long and very time consuming. Although ASCII is a computer code that consists of graphs and numbers it actually shortens the text. and hexadecimal has been proven to be less reliable and binary is a short code with little symbols

8 0
2 years ago
Read 2 more answers
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is
ruslelena [56]

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

5 0
2 years ago
Other questions:
  • What's a qat on a computer
    12·2 answers
  • >
    6·1 answer
  • The issue with discovering a perfect solution to a problem is that ________.
    10·2 answers
  • Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
    8·1 answer
  • Which is a good guideline to follow when choosing a background for your slides?. . A. Use a different background for each slide.
    8·1 answer
  • What should be used to keep a tablet dry?
    13·1 answer
  • What is the output of the following C++ code?
    14·1 answer
  • Label provides the code that executes if no case label is matched ​
    6·1 answer
  • The first page of a website is what?​
    5·2 answers
  • Your company decided to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against f
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!