1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
4 years ago
14

Seth is researching new developments in cancer treatments. Which suggestion would be most beneficial to making sure his search r

esults are not outdated?
Computers and Technology
1 answer:
Anuta_ua [19.1K]4 years ago
3 0

Answer:

answer is d

Explanation:

You might be interested in
Using the C language, write a function that accepts two parameters: a string of characters and a single character. The function
Sav [38]

Answer:

#include <stdio.h>

void interchangeCase(char phrase[],char c){

  for(int i=0;phrase[i]!='\0';i++){

      if(phrase[i]==c){

          if(phrase[i]>='A' && phrase[i]<='Z')

              phrase[i]+=32;

          else

              phrase[i]-=32;      

      }

  }

}

int main(){

  char c1[]="Eevee";

  interchangeCase(c1,'e');

  printf("%s\n",c1);

  char c2[]="Eevee";

  interchangeCase(c2,'E');

  printf("%s\n",c2);    

}

Explanation:

  • Create a function called interchangeCase that takes the phrase and c as parameters.
  • Run a for loop that runs until the end of phrase and check whether the selected character is found or not using an if statement.
  • If the character is upper-case alphabet, change it to lower-case alphabet and otherwise do the vice versa.
  • Inside the main function, test the program and display the results.
8 0
3 years ago
Who created Tik-Tok what year and date
STALIN [3.7K]

Answer:

TT was created by Byte Dance in China on September 2016

4 0
4 years ago
Read 2 more answers
Who is responsible about developing the security policy in your organization?
riadik2000 [5.3K]

Answer:

Security adviser

Explanation:

4 0
3 years ago
Read 2 more answers
If you are to recommend type of cloud for a education institutions (e.g universities), which one would you choose? (private or p
Bas_tet [7]

Answer:Private cloud

Explanation: Education institute require some kind of security and reliability for their data so that it can remain secure between the students and the staff only and no unauthorized access can be done.

The setting up of the private cloud is a better method for sharing of the information among the institute because it is controlled by the internal sources only ,unlike the public cloud.This service enhances the security and is accessible by the organization members only with the on-request service feature.

3 0
4 years ago
A technician needs to upgrade the RAM in a database server. The server's memory must support maintaining the highest levels of i
tamaranim1 [39]

If the technician needs to upgrade the RAM in a database server, the type of RAM that  the technician need to install is ECC (Error correction code).

<h3>What is the server about?</h3>

An error correcting code (ECC) is known to be a kind of an encoding scheme that moves messages as a kind of a binary numbers.

Note that it often does this in a way that the message is one that can be gotten back even if a little or some bits are said to be erroneously flipped.

Hence, If the technician needs to upgrade the RAM in a database server, the type of RAM that  the technician need to install is ECC (Error correction code).

See full question below

A technician needs to upgrade the RAM in a database server. The server's memory must support maintaining the highest levels of integrity. Which of the following type of RAM should the technician install?

ECC (Error correction code)

Parity

Non-parity

SODIMM

Learn more about RAM from

brainly.com/question/13196228

#SPJ1

4 0
2 years ago
Other questions:
  • Once the technology for the collection of solar power is in place what will be two benefits of its use
    9·1 answer
  • What is statement used to communicate ones feelings in a nonconfrontational manner
    9·1 answer
  • Which of the following is true regarding Moore’s Law? A.) explained the growth in computing capabilities between 1965 and 1995 B
    14·1 answer
  • Which data type requires the greatest number of bytes in computer memory? A. character B. integer C. single-precision number D.
    14·1 answer
  • NEED BY 15 MINUTES PLEASE! WILL MARK BRAINLIEST!You can create special effects in an image using a camera or a photo-editing too
    5·1 answer
  • You are the IT security administrator for a small corporate network. Due to some recent restructuring, Corey Flynn (flynn) no lo
    11·1 answer
  • which button will allow you to insert quotes and notes into text into a document​ A comment B compare C research d margins
    14·1 answer
  • Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
    11·2 answers
  • A student will not be allowed to sit in exam if his/her attendance is less than 75% .
    8·1 answer
  • Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!