1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elan Coil [88]
3 years ago
8

Nosql is a great technology for storing well-structured data. a. True b. False

Computers and Technology
1 answer:
mash [69]3 years ago
3 0
I'd say False

NoSQL or the non-rational databases are document oriented and distributed. Unlike the SQL or the relational databases which are structured, NoSQL deals with a huge amount of unstructured data and offer greater flexibility. NoSQL are more like file folders, gathering related information of all types.



You might be interested in
You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:
Sidana [21]

Answer: Hello your required question is wrong as it does not tally with the data provided , attached below is the complete question

answer:

/23 /26 /27 /28   option A

Explanation:

<u>Breakdown of the last four subnet masks given to the subnets </u>

For the subnet of 500 production host the mask = /23 which will produce 512 hosts

For the subnet of 60 sales host the mask = /26 which will produce 64 hosts

For the subnet of  12 host the mask = /27 which will produce 32 hosts

For the subnet of 30 hosts the mask = /28 which will produce 16 hosts

4 0
3 years ago
What is GIGO ?<br>plz answer me​
DanielleElmas [232]

Answer:

Garbage in, garbage out

Explanation:

In computer science, garbage in, garbage out is the concept that flawed, or nonsense input data produces nonsense output or garbage

4 0
2 years ago
This program will convert a set of temperatures from Fahrenheit to Celsius and Kelvin. Your program will be reading in three dou
Naily [24]

Answer:

see explaination

Explanation:

#include<iostream>

#include<iomanip>

using namespace std;

int main()

{

double temp1,temp2,inc,cel;

int i=1;

while(i==1)

{

i=0;

cin>>temp1>>temp2>>inc;

if(temp2<temp1||inc<=0)

{

i=1;

cout<<"Starting temperature must be <= ending temperature and increment must be >0.0\n";

}

}

cout<<endl;

cout<<setw(15)<<"Fahrenheit"<<setw(15)<<"Celsius";

while(temp1<=temp2)

{

cel=(temp1-32)/1.8;

cout<<endl;

cout<<fixed<<setprecision(3)<<setw(15)<<temp1<<setw(15)<<cel;

temp1+=inc;

}

}

Please kindly check attachment for output.

8 0
3 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
Zenmap's topology tab displays a __________ that shows the relative size and connection type of all discovered ip hosts.
VladimirAG [237]
<span>Zenmap's topology tab displays a "Bubble Chart" that shows the relative size and connection type of all discovered IP hosts.
</span>A kind of chart which shows three dimensional data is known as Bubble chart. It also can be seen as the variation of scatter plot where bubbles replace the data points.
4 0
2 years ago
Other questions:
  • Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" an
    13·2 answers
  • Emma wants to create a web page for her school’s volleyball team. Which of these could she use?
    7·1 answer
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
    6·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • Which statement best describes desktop publishing?
    10·1 answer
  • When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choic
    15·1 answer
  • It is where your cpu (processor) is installed
    10·2 answers
  • What is the value of the variable named result after the following code executes?
    10·1 answer
  • For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!