1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
3 years ago
11

Which computer company was named after an orchard? dell, apple, or ibm

Computers and Technology
1 answer:
saveliy_v [14]3 years ago
6 0
It was of course Apple. The founder spent a summer in an Oregon orchard
You might be interested in
. Briefly describe an SQL DML statement for changing existing data in a table.
bearhunter [10]

Answer:

The Update statement in the DML is used for changing existing data in a table.

Explanation:

Their are following Sql statement in the DML.

Insert

This SQL statement is used for inserting data into the table.

select

This SQL statement is used for retrieving data from database  

update

This SQL statement is used for updating data in a table.

delete

This SQL statement is used for delete data from database .

The "UPDATE" SQL statement in DML is used for Modify the data in the existing table .

Following are the syntax of Update SQL query

Update tablename

set column1=value1,column2=value2............column N=valueN

Where condition;

Example :Suppose we have student table and (rollno,name,age and add) are the field for that table we have to change the address of rollno 105

Then we use update query like that

UPDATE STUDENT

SET add='kalam nagar'

where rollno=105;

8 0
3 years ago
c++ Write a statement that increments (adds 1 to) one and only one of these five variables: reverseDrivers parkedDrivers slowDri
Mazyrski [523]

Answer:

The following statement are:

if(speed < 0) // if statement

{

reverseDrivers++; //if the speed is less than 0, then increment in "reverseDrivers"

}

else if(speed < 1) //else if statement

{

parkedDrivers++; //speed is less than 1, than increments in "parkedDrivers"

}

else if(speed < 40)

{

slowDrivers++; //speed is less then 40, than increment in "slowDriver"

}

else if(speed <= 65)

{

safeDrivers++; //speed is less than or equal to 40, then increment in "safeDriver"

}

else

{

speeders++; //else increment in speeders

}

Explanation:

From the following statement their are certain condition arises

If the speed is less than 0, then increments the “reverseDrivers” variable by 1.

If the speed is less than 1, then increments the “parkDriver” variable by 1.

If speed is less than 40, then increment in "slowDriver" variable by 1.

If speed is less than or equal to 40, then increment in "safeDriver" variable by 1.

Otherwise increment in "speeders"

7 0
3 years ago
Manufacturing product designs must be tested before they are put into production. Who is responsible for this?
hammer [34]

For testing the designs of the product prior to putting it into production, mechanics should be responsible for the same.

The information related to the mechanics engineers is as follows:

  • They are responsible for manufacturing & designing of machines & products.
  • It is the engineering branch.
  • Moreover, they are fully responsible for developing things.

Thus we can say that for testing the designs of the product prior to putting it into production, mechanics should be responsible for the same.

Learn more related to the production here: brainly.com/question/22852400

4 0
2 years ago
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
2 years ago
Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require
4vir4ik [10]

Answer:

packet filtering

Explanation:

We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D

7 0
3 years ago
Other questions:
  • When creating a software package, the software must be designed, the code must be written, and then the code must be tested. Thi
    6·1 answer
  • The most common types of utility programs fall into these categories. accessibility calculation communication data entry enterta
    6·2 answers
  • List 3 items that were on kens resume that should have been excluded
    13·2 answers
  • A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,
    9·1 answer
  • What is the first step to apply the line and page breaks options to groups of paragraphs in a Word document?
    10·2 answers
  • Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)
    9·1 answer
  • You are configuring NIC teaming on a server with two network adapters. You chose Switch Independent Mode. You now must choose be
    15·1 answer
  • What is the difference between MySQL and MariaDB?
    9·1 answer
  • Can someone help me answer this, I can’t fail tysm :)
    11·1 answer
  • Any anime weebs wanna talk
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!