1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
3 years ago
5

. The BEST description of a proprietary database is one that

Computers and Technology
1 answer:
AVprozaik [17]3 years ago
8 0
Is free to the public
You might be interested in
6. Write a C++ program to print the largest three elements in an array. <br>​
jasenka [17]

Answer:

if (arr[i] > max) -> max3 = max2, max2 = max , max = arr[i]. else if (arr[i] > max2) -> max3 = max2, max2 = arr[i]. else if (arr[i] > max3) -> max3 = arr[i]. At the end of the loop, we will print all three values.

7 0
2 years ago
Which of the following is not an algorithm?
Kipish [7]

Answer:

The correct answer is: "D. shapoo instructions (lather, rinse, repeat)".

Explanation:

Among the options given, letter D is the only one which does not apply and  may not function as an algorithm. An algorithm is a set of rules and/or instructions which aims at solving a problem and/or task, therefore, "shapoo instructions" do not classify as an algorithm because they are only written informations to explain how to use a product (lather, rinse, repeat), rather than setting a procedure for solving a problem in terms of technology tools. All the other options are examples of algorithms because they already exist as such and also function as technology tools.

(ps: mark as brainliest, please?!)

7 0
2 years ago
Types of computer viruses<br>​
e-lub [12.9K]

Answer:anti various

Explanation:hope fully this will help u

5 0
3 years ago
Read 2 more answers
Serveral cheetas are growling at each other while hunting for animals.for which need are they competing?
SVEN [57.7K]

Answer:

prey

Explanation:

5 0
3 years ago
Chat messages are most likely to be found where on a computer? firewall nic internet history ram
miv72 [106K]
<span>The answer is RAM.  Chat messages are most likely to be found in the RAM of the computer.  It is Random Access Memory.  </span><span>RAM is considered volatile memory, which means that the stored information is lost when there is no more power.</span>
3 0
2 years ago
Other questions:
  • Explain the difference between an i/o‐bound process and a cpu‐bound process.
    12·1 answer
  • A person who wants to buy a compact disc (cd) has just enough money to buy one, and chooses cd a instead of cd
    10·2 answers
  • Write a function named printtriangle that receives a parameter that holds a non-negative integer value and prints a triangle of
    7·1 answer
  • Suppose the price of a complement to LCD televisions falls. What effect will this have on the market equilibrium for LCD​ TVs? T
    13·1 answer
  • PLEASE help me RIGHT NOW!!!!!!!!! I will give a Brainly to anyone who helps me!
    15·1 answer
  • Effective presentations vary the color scheme on each slide.
    7·2 answers
  • In his digital portfolio, Ben wants to locate each work he created. Where can he list details about the work in his digital port
    7·2 answers
  • Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?
    13·1 answer
  • Jade has to create a workbook for storing information of students participating in the annual state-level sports competition. Th
    5·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!