1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
8

Please help!!

Computers and Technology
1 answer:
vovikov84 [41]3 years ago
7 0

Answer:

I Don't Know if this is right, but for the first part it would be people making hype for a product so more people know about it.

Sorry thats all I got, but i saw u had no other answers so I hope this did You some good :(

You might be interested in
A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on mult
Mrrafil [7]

A raid 1 and mirrored system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives.

<h3>What is Disk mirroring?</h3>

In data storage, disk mirroring is a term that connote the doubling of logical disk volumes into a different physical hard disks so that it will always be available.

Conclusively, Note that this is mostly used in RAID 1. A mirrored volume is known to be full logical depiction of separate volume copies and as such the answer above is correct.

Learn more about system from

brainly.com/question/25594630

8 0
3 years ago
Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
oee [108]

Answer:

The result of combining the both tables is:

Employee(EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

Since the EmployeeNum is the primary and it is available in both tables, what happens is that, it will not list the primary key column twice. It will list the primary key first then all the other attribute in the first table followed by the attribute in the second table. And it will take note so as not to repeat attribute that already occur in the first table.

For instance; in this case, besides EmployeeNum, LastName and FirstName also appear in the both tables but only one instance of them were listed in the resulting table.

4 0
3 years ago
Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output i
Nitella [24]

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

4 0
3 years ago
Read 2 more answers
select all examples of proper keyboarding technique. rest your fingers gently on the home row or home keys. slouch in your chair
padilas [110]

Rest your fingers gently on the home row or home keys.

Rest your palms on the keyboard.

Relax your fingers.

All the above are proper keyboard techniques apart from slouch in your chair. It is always recommended to sit up straight with your feet positioned on the floor for balance. Do not cross. Center your body to the H key and have your elbows at sides and bent about 90 degrees. Use correct fingering and deploy touch typing. These and many others will help develop optimal speed and accuracy and help prevent the development of stress injury.

6 0
3 years ago
Read 2 more answers
Technology that verifies a person's identity is _____. a smart card Automated Fingerprint Verification an EPD a digital ink pen
tresset_1 [31]
The answer is Automated fingerprint.
 Automated Fingerprint is the process that verifies a person's identity. It is primarily used for law enforcement agencies for criminal identification initiatives. It is important because it includes identifying a person suspected of committing a crime or linking suspects to unsolved crimes. 

3 0
3 years ago
Read 2 more answers
Other questions:
  • You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his works
    7·1 answer
  • Why dose this keep popping up will give brainlest for first person answer
    12·1 answer
  • Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
    9·1 answer
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • It is a field that contains a unique identifier for each record in a primary table
    5·1 answer
  • Investigar las oportunidades de empleo y el autoempleo dentro del área de la especialidad<br>​
    14·1 answer
  • BST
    13·1 answer
  • Does anyone know how I can "guest browsing" when it's blocked ?
    7·1 answer
  • create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.
    6·1 answer
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!