1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
11

If data is excluded from a view using a filter, it may be recovered within thirty days.

Computers and Technology
1 answer:
andrew11 [14]3 years ago
3 0

Answer:

False.

Explanation:

You might be interested in
Pseudocode of creating a program to convert to IEEE 754 to a real number
Eduardwww [97]

Answer:

  • Step1: Check If the number is Positive or Negative.  
  • Step2: If it is positive then save the sign of it as 0.  
  • Step3: If it is negative then save the sign of it as 1.
  • Step4: Covert the negative number to Positive.
  • Step5: Convert the IEEE 754 to Binary.
  • Step6: convert the integer part into binary form  
  • Step7: Convert fractional part into binary form
  • Step8: To convert Integer part, Devide the number by 2 and note down the reminder and Keep deviding unless dividend is less than 2
  • Step9: copy all the reminders together
  • Step10: Multiply decimal part by 2 unless fractional part is 0.
  • Step11: By noting down integral part, keep multiplying decimal part by new value of 2 untill perfect number is reached.
  • Step6: Find the Mantissa.
  • Step7: Concatinate the Sign, exponent and the mantissa.

Explanation:

For Example : 20.75

First step (converting 50 (in base 10) to binary):

  • No is Positive
  • By dividing 20 by 2, which gives 10 with no remainder 0.
  • Now Devide 10 by 2, which gives 5 with a remainder of 0.
  • Now Devide 5 by 2, which gives 2 the reminder as 1
  • Now Devide 2 by 2, which gives 1 with reminder as 0
  • Now devide 1 by 2, which gives 0 with reminder as 1
  • We read the result from bottom to top  which is 10100

Second part is to convert 0.75 to binary:

  • We have to multiply 0.75 by 2, which gives 1.5. We keep only the integer part, which is 1.  
  • Now, we do 1.5 - 1, which gives 0.5. Now, We multiply 0.5 by 2, which gives 1.  
  • Now we do 1 - 1, which gives 0.
  • Reading from Top to bottom will give 110

Final Answer is : 10100.110

8 0
3 years ago
Solving a current problem with existing information gathered for another purpose is ____research
Vesnalui [34]
Primary research for your question
7 0
3 years ago
Read 2 more answers
Business process re-engineering
Lorico [155]

Answer:

d. asks you to rethink the way you are doing your work.

Explanation:

A business strategy generally sets the overall direction for a business and as it focuses on defining how a business would achieve its goals, objectives, and mission; as well as the funds and material resources required to implement or execute the business plan.

Business process re-engineering can be defined as a strategic technique which typically involves being innovative while discarding old business processes, procedures and ideas in order to achieve maximum level of success.

Hence, business process re-engineering asks you to rethink the way you are doing your work.

For example, if you use manual labor for the production of your goods but then decided to start using automated machines for the production and packaging of your products. .

8 0
3 years ago
What are some ways to access the Excel Help window? Check all that apply. clicking and dragging the zoom slider on the status ba
Fudgin [204]

double-clicking the title bar

clicking the question mark in the upper-right corner of the interface

8 0
4 years ago
Read 2 more answers
________________ involves tricking other people into breaking security procedures and sharing sensitive information.
Nuetrik [128]

Answer:

The right answer is social engineering.

Explanation:

social engineering has different meanings in terms of computer security and social studies.

In computer security, social engineering can be defined as the practice to manipulate some people so that they give their personal credentials with the attacker. Their first moto is to gather the information of that user by fraud.

It can be the credential of banking, system access etc.

Hence, the most appropriate answer is social engineering.

5 0
3 years ago
Read 2 more answers
Other questions:
  • A field that will always have a unique value is
    15·2 answers
  • I am a receptionist for a large corporation
    8·1 answer
  • A bank system mainframe is struck by a DDoS attack and goes offline. Customer’s cannot log on to their accounts. Which element o
    11·1 answer
  • Instructions:Select the correct answer.
    6·2 answers
  • AT&T reacted to the popularity of the cellular phone by adding several cellular models to its line of regular phones. Availa
    8·1 answer
  • One way to prepare for filing the PROFILE is to:
    12·2 answers
  • What is the missing line of code?
    13·1 answer
  • Suppose that an intermixed sequence of push and pop operations are performed on a LIFO stack. The pushes push the numbers 0 thro
    14·1 answer
  • Pls help its not school work i just need this fixed
    13·1 answer
  • Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain s
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!