1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
15

Barbara has three computers connected to the same network in her home. What

Computers and Technology
1 answer:
Anastaziya [24]3 years ago
5 0

Answer:

LAN

Explanation:

i am not sure but I think it is lan

You might be interested in
What are basic difference between variable and data type in the c? ​
OLga [1]

Answer:

there is lot of difference

7 0
3 years ago
Describe the tools that are required to accomplish each step in the data management process.
RideAnS [48]

Answer: The tools which are required to accomplish each step in the data management process are:

1. Cloud Data Management tools.

2. Master Data Management (MDM) tools.

3. Reference Data Management (RDM) tools.

4. ETL tools.

5. Data visualization and  analytics tools

Explanation:

Cloud Data Management tools with the help of various API's are able to connect multiples system with their data to the cloud. examples are amazon cloud, google API cloud.

MDM tools are used for creation and maintenance of reference data. example are Profisee

RDM tools is used with the MDM tools and are use to define the businesss processes over the reference data. Examples are Collibra.

ETL tools helps to load data of an organisation to data warehouses after transformation and testing the data pipeline constituting the data from different databases.

Data visualization  analytics tools helps to extract and generate report from the big sets of data which can help an organisation to take business decisions.

6 0
3 years ago
Read 2 more answers
Javascript or java? which one is better?
kifflom [539]
See, one is more or less a toy, designed for writing small pieces of code and traditionally used and abused by inexperienced programmers. 

The other is a scripting language for web browsers. Sorry about my limited knowledge.
3 0
3 years ago
Read 2 more answers
Which line of code will create an instance of the pet class?
Sunny_sXe [5.5K]

Answer:

myPetA = pet(self, 'dog', 'Spot')

Explanation:

I mite be wrong

8 0
2 years ago
Read 2 more answers
use the following binary search tree to answer the questions. a. how many comparisons are needed to search for ""2"" in this tre
Nesterboy [21]

A data structure called a binary search tree makes it simple to keep track of a sorted list of numbers.

<h3>What is a binary search tree?</h3>

A binary search tree, also known as an ordered binary tree or a sorted binary tree in computer science, is a rooted binary tree data structure where each internal node's key is higher than all the keys in its left subtree and less than all the keys in its right subtree.

A data structure called a binary search tree makes it simple to keep track of a sorted list of numbers. Because each tree node has a maximum of two offspring, it is known as a binary tree. It can be used to search for the presence of a number in O(log(n)) time.

A binary search tree (BST) is a specific type of binary tree in which every node has a comparable key and a connected or associated value.

To learn more about binary search trees refer to:

brainly.com/question/28295292

#SPJ4

6 0
2 years ago
Other questions:
  • If you receive an increase in pay, how will that affect your payroll deductions?
    8·1 answer
  • A company that hires only American Indians is practicing
    5·2 answers
  • 4. Scientists are not concerned with the human impact on the environment. True or False?
    6·2 answers
  • Which online resource is usually not free?
    10·2 answers
  • Explain briefly why every person in the world is not connected to the Internet.
    9·1 answer
  • You are tasked with leading a project to build a custom software testing tool for client. You have been provided with a set of p
    7·1 answer
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device b
    14·1 answer
  • PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
    14·1 answer
  • How is your favorite singer and why I will give Brainliest
    10·2 answers
  • What does the asterisk (*) after select tell the database to do in this query?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!