1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
14

In the table below identify the data type that would be most suitable for the second field

Computers and Technology
1 answer:
marishachu [46]3 years ago
6 0

Answer:

C.

Explanation:

The second field is Age. Age is expressed as a number so will most likely be stored in a number data type.

You might be interested in
Which of the following relate to the term Technology?
sp2606 [1]

Answer:

the answer is D.All of the above

7 0
3 years ago
Read 2 more answers
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are
tensa zangetsu [6.8K]

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

8 0
2 years ago
How's your day :D I hope its goin well you amazing person :D
Rainbow [258]

Answer:

You are an awesome and amazing person!!

Explanation:

7 0
3 years ago
Read 2 more answers
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
2 years ago
Other questions:
  • You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP addre
    13·1 answer
  • Two ways that a deer depends on plants to survive
    11·2 answers
  • A network technician is designing a network for a small company. The network technician needs to implement an email server and w
    7·1 answer
  • ​Lara is the chief editor of "Laughter and Life," an online magazine. Lara has assigned Jenny the task of redesigning the magazi
    5·1 answer
  • Modify the sentence-generator program of Case Study so that it inputs its vocabulary from a set of text files at startup. The fi
    15·1 answer
  • How to convert 23.125 to binary (Hex) using the double - precision representation
    6·1 answer
  • Type the correct answer in the box. Spell the word correctly.
    15·2 answers
  • Cuáles son las partes más importantes de una flor​
    7·1 answer
  • A ____________ is a collection of commands given a name.
    11·1 answer
  • Which major nims component describes systems and methods
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!