1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sauron [17]
3 years ago
8

An inventory clerk, using a computer terminal, views the following on screen: part number, part description, quantity on hand, q

uantity on order, order quantity, and reorder point for a particular inventory item. Collectively, these data make up a__________.a) Fieldb) Filec) Databased) Record
Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
3 0

Answer:

The answer is letter D. RECORD

Explanation:

An inventory clerk, using a computer terminal, views the following on screen: part number, part description, quantity on hand, quantity on order, order quantity, and reorder point for a particular inventory item. Collectively, these data make up a____Record______

You might be interested in
List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will
lukranit [14]

The five moral dimensions are:

  • Information rights and obligations.
  • Property rights and obligations
  • System quality.
  • Quality of life,
  • Accountability and control.

I see that Quality of life is most difficult for society to deal with as there ae lots of rich and poor people and the government have not been able to bridge the gap between them.

<h3>What are the morals about?</h3>

The five main moral dimensions that are known to be written above are said to be tied together in regards to ethical, social, and political issues that are seen in any information society.

Therefore, The five moral dimensions are:

  • Information rights and obligations.
  • Property rights and obligations
  • System quality.
  • Quality of life,
  • Accountability and control.

Learn more about moral dimensions from

brainly.com/question/15130761

#SPJ1

3 0
2 years ago
Source Code for TF2 - Please insert it here
Advocard [28]

Answer:

Hi T!

Explanation:

How are you?

3 0
3 years ago
Write a program that accepts the lengths of three sides of a triangle as inputs. the program output should indicate whether or n
omeli [17]

The code will have to obey the Pythagorean theorem that says square of the hypotenuse side is equals to the sum of the squares of the other legs.

<h3>How to write a code that check if a triangle is a right angle by using Pythagoras theorem?</h3>

The code is written in python.

def right_triangle(x, y, z):

    if x**2 + y**2 == z**2 or y**2 + z**2 == x**2 or z**2 + x**2 == y**2:

         print("it is a right angle triangle")

    else:

         print("it is not a right angle triangle")

right_triangle(6, 10, 8)

<h3>Code explanation</h3>
  • we defined as function named "right_triangle". x, y and z are argument which are the length of the triangle.
  • Then we check if the sides obeys Pythagoras theorem.
  • If it does we print a positive statement else we print a negative statement.

Learn more about python at: brainly.com/question/21437082

#SPJ4

4 0
2 years ago
Adam, a flower shop owner, wants to drive phone calls to his store. Which Adwords tool should he use to track how many calls res
Kipish [7]

Answer:D)Conversion tracking

Explanation:Conversion tracking is the tool that helps the user to know about the interaction of the ad given by him with customer. It helps in the tracking in the ways like calls from ads, call conversion importing,mobile website gaining the number of clicks etc.

Thus,  Adam needs to use the conversion tracking tool which for driving the calls towards his store.He can track the effectiveness of the ad which drives the calls.

Other options given are incorrect because they cannot keep the record of the  ads seen by the customer with the help of tracking. Thus the correct option is option(D).

8 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Other questions:
  • Which of the following will affect the size of your monthly mortgage payment? A The size of your down payment B The length of yo
    5·1 answer
  • Describe a way in which a badly-designed or badly-constructed STRUCTURAL subsystem might impact the PROPULSION subsystem.
    5·1 answer
  • Median of a sample If the distribution is given, as above, the median can be determined easily. In this problem we will learn ho
    15·1 answer
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • Which kinds of Internet content do you think you need permission to use? Check all that apply.
    8·2 answers
  • Marilyn needs help exporting her spreadsheet as a few different types of files. She needs to know exactly how her file should be
    11·1 answer
  • I NEED IT NOWW
    13·2 answers
  • Jess computer has system software including an operating system and utility software jess runs the defragmentation program on he
    5·1 answer
  • Answer to this problem
    11·1 answer
  • An error in the sequence of words or rules in a program that prevents the program from running is what?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!