1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
2 years ago
13

. The incorrect attitude towards driving is the cause of most collisions among teenage drivers.

Computers and Technology
2 answers:
Oksanka [162]2 years ago
7 0
The correct answer is true
enyata [817]2 years ago
3 0
The correct answer for your question is TRUE

You might be interested in
If you wanted to only view the sales of $200,000+ in the table above, which number filter would you select?
Vinil7 [7]
It's either answer A or B
6 0
3 years ago
2. (8 points) When creating the Academic Database, there were several instances of data
Bad White [126]

Answer:

See explaination

Explanation:

An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.

One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.

One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.

Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.

8 0
3 years ago
Describe the following types of data hazards. RAW WAR WAW
aleksandr82 [10.1K]

Answer: Data hazards are the factor behind the damage/problem created in the data of the CPU . There are three types of data hazards which are as follows:-

By considering two element "A" and "B"

  • RAW(Read after write)- If the element A tries to read the value before the element B has written it then element A will receive the previous value which is accordingly incorrect .
  • WAR(Write after read)-Element B write a value for element A which not read by it.So, it incorrectly gets a new destination assigned.
  • WAW(Write after write)-Element B tries to write the value for the element A before element A writes it, thus creating a hazard.

5 0
2 years ago
It took her 9 more months but Marina has managed to save the full $725 plus more to cover fees to pay off the pay-day loan compa
Marianna [84]

Answer:

she loaned 750 dollars.

it took her 9 months to repay it.

it was 275 days since she took out the loan.

the interest rate was 47% per year compounded daily.

the daily interest rate would be 47% / 365 / 100 = .0012876712 per day.

this assumes 365 days in a year, which is the standard assumption that i know of.

the future value of 750 for 275 days would be based on the formula of f = p * (1 + r) ^ n

f is the future value

p is the present value

r is the interest rate per time period (days in this case)

 

n is the number of time periods (days in this case).

the formula becomes:

f = 750 * (1 + .0012876712) ^ 275

solve for f to get:

f = 1068.440089.

that's the future value of the loan.

it's what she owes.

the interest rate on the loan is that value minus 750 = 318.440089.

that's how much extra she needs to pay in addition to whatever fees she was charged.

6 0
3 years ago
A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
andreev551 [17]

Answer:

1. DMZ  (Demilitarized zone)

Explanation:

In computer networking, a Demilitarized Zone is a physical or logical network designed to give an extra layer of security on the organization’s private network. The DMZ acts as an interface between an untrusted network such as the internet and the organization’s internal network. When a server is set up in a demilitarized zone, users can reach it via its public IP address. In case there is an attack on the server, the private network is still protected.

3 0
3 years ago
Other questions:
  • With a(n) ____ data table you can vary the value in one cell.
    5·1 answer
  • A(n ____ with a drop down menu provides consistency in function and appearance making it easy for users to learn and work with t
    7·1 answer
  • I'm the state of Florida, your first conviction for DUI can result in your vehicle being impounded for
    5·1 answer
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • In which phase of the software development process would probing questions be used to verify the problem definition?
    12·1 answer
  • One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of I
    5·1 answer
  • Whic flag has a special role in debuging
    6·1 answer
  • Please help, Tech class!!
    14·1 answer
  • What is one way a pivottable could combine the following data?
    8·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!