1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
4 years ago
11

Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.

Computers and Technology
1 answer:
Eddi Din [679]4 years ago
4 0

Answer:

read-only properties.

Explanation:

Only the read only properties can view but cannot change the data.The user don't have access to the no access properties, full-access properties can read and modify the data.The write only properties can only modify the data.So to only view the data the data should have read only properties.

You might be interested in
Write the definition of a function typing_speed, that receives two parameters. The first is the number of words that a person ha
m_a_m_a [10]

Answer:

The function code and the formula for the above question is listed below:

Explanation:

Function:

float typing_speed(int Number_of_words, int Time_in_seconds)

{

float time= Time_in_seconds/60;

float speed= Number_of_words/time;

return speed;

}

Formula for this algorithm or program:

Number of words per minute= number of words/ Time(in minutes).

Function Explanation

  • The above function defined in the c-language code, which is used to return the typing speed for any user when he enters the number of words and the time in seconds.
  • The speed is calculated with the help of the above-defined formula.
  • The first statement of the code is used to change the time in a minute.
  • The second statement of the code is used to calculate the speed by the help of speed formula.
  • Then the third statement returns the value of the speed variable.

6 0
3 years ago
Which of these has led to the evolution of mobile marketing?
Nana76 [90]
D. using cell phones in a work place. when cell phones came out with apps and games people started paying more attention to the social media apps and their games then their own job, hope this helps :)
5 0
3 years ago
Need this!!
Galina-37 [17]

Answer

Peer-to-peer network

Explanation

Social media video sharing networks a platform which is an entertainment based where members can share videos in a site. it allows easy integration with other social networking platforms to share and watch videos. To start  a social media video sharing network, Rebecca  is required to set up a Peer-Peer Network.

Peer-Peer network is created when two or more computers are connected and they are sharing resources without going through separate servers. That is a couple of computers are  connected via a Universal Serial Bus to transfer files.


3 0
4 years ago
Read 2 more answers
which type of collaborative tool would you use to send a brief text-based message to a team member through computer systems rath
zzz [600]

Answer:

A. Instant Messaging

Explanation:

3 0
3 years ago
Im bored, any anime recommendations? i probably watched whatever youre gonna say
Alex777 [14]

Answer:

Hi..

Explanation:

i have seen a lot of anime shows XD hunter x hunter, dbz, black clover, 7 deadly sins

3 0
3 years ago
Read 2 more answers
Other questions:
  • Maurice has just purchased his first computer, which contains a preinstalled suite of basic software applications. He receives a
    8·2 answers
  • 6. When you don't have enough room to stop, you may _______ to avoid what's in front of you.
    14·1 answer
  • Which of these is an example of an open source software
    11·1 answer
  • What does nntp stand for?
    12·2 answers
  • You have been asked to troubleshoot a legacy system running a critical component on your employer's network. Initial findings in
    7·1 answer
  • Rob Janoff believes that technology should not be used too
    11·1 answer
  • Write code to complete PrintFactorial()'s recursive case. Sample output if userVal is 5:5! = 5 * 4 * 3 * 2 * 1 = 120
    11·1 answer
  • Explain how signal detection theory can be used to analyze web site reading and searching. Based on this analysis, provide three
    14·1 answer
  • Which three factors should be discussed before planning and building a project?
    15·1 answer
  • Which items in the list below are viruses. Click in the box to select your answer(s).
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!