1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
7

What is the best definition for a relationship?

Computers and Technology
1 answer:
velikii [3]3 years ago
7 0

Answer:

special instance of a dataset

You might be interested in
Mention<br>any<br>5<br>indicators of<br>happiness​
Maru [420]

Answer:

5 indicators of happiness that might surprise you · Happiness is deep · Happy is busy · Can't buy me happiness · The happiness gene · No regrets.

Explanation:

5 0
4 years ago
Read 2 more answers
PLEASE HELP MEH IDK WHAT TO DO!!!!! PLEASE!!!!!!!!!!!!
Over [174]
I would ask myself c
3 0
4 years ago
Read 2 more answers
What is not an example of ai
BARSIC [14]

Answer:

human

Explanation:

because it is not a machine

8 0
3 years ago
Read 2 more answers
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
The nth term of the given sequence is n(n+1)÷2.calculate the number of dots in the 8th term​
Bess [88]

Answer:

the 8th term of the given series =n( n+1)÷2= 8(8+1)÷2 = (8×9)/2 = 72÷2 = 36

8 0
3 years ago
Other questions:
  • 8.14 Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O devi
    7·1 answer
  • Name the main technology used to connect computers to devices
    6·1 answer
  • What is the maximum number of communication paths for a team of twenty people?
    5·1 answer
  • All network operating systems today use the ____ protocol suite for internet communication.
    14·1 answer
  • What are two reasons people work?
    7·2 answers
  • The Presonus Studio Live 24 console has analog D-sub direct outputs. What cable would you need to connect this to a HD Analog in
    15·2 answers
  • How could you insert a new row between rows 20 and 21?
    7·2 answers
  • True or false for a given set of input values, a nand
    7·1 answer
  • Help me? ill do anything ill let u smash me or anything just HELP!
    15·2 answers
  • The RAND() function in Excel returns a pseudo-random number between 0 and 1. If you enter this function into 1000 cells (i.e. en
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!