1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
14

Please I need all the help I can get Thank You So Much

Computers and Technology
1 answer:
Katen [24]3 years ago
7 0

1-A database is an organized collection of data, generally stored and accessed electronically from a computer system (2 choice)

2 - All of the above

3-record

4- B i think

I hope this helped. :D

You might be interested in
Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an
Alexxandr [17]

The type of network that consists of multiple Windows computers that share information is peer-to-peer. In this network, the computer serves as an authoritative source of user information.

<h3>Peer-to-peer computer networks</h3>

A peer-to-peer (P2P) network can be defined as a type of network where the computer acts as a source of user information.

In P2P, a cluster of different computers are linked and they have the same permissions for processing data in the network.

This type of computer network (peer-to-peer computer network) has been created to serve and/or receive data.

Learn more about peer-to-peer computer networks here:

brainly.com/question/1172049

7 0
3 years ago
What type of light is commonly used by a plate making unit to expose plates
Margarita [4]

Answer:

ultraviolate light

Explanation: Because the photosensitive material in the plate reacts to the ultraviolate light and causes a chemical change exposing the plate

8 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Under which menu option of a word processing program does a star appear?
Citrus2011 [14]

A callout is a type of text box that also includes a line for pointing to any location on the document. A callout appears under the SHAPES <span>menu of the word processing program. The answer that completes this statement is the word "shapes". Hope this answers your question. </span>
3 0
3 years ago
Read 2 more answers
QUESTION 2 Fruit is an enumerated type with values apple, banana, grape, and orange, in that order. Which of the following state
Llana [10]

Answer:

Option A i.e., snack = Fruit.orange;

Explanation:

It is the user-defined data type which is mainly used to initialize the names or titles to integral constants so in the following statement 'Fruit' is the enumerate data type function and its values are the followings given in the statement, 'snack' is the variable of the function 'fruit' that is an enum type, so the initialization is done by the following type in the Java Programming Language.

6 0
3 years ago
Other questions:
  • After an extruded feature has been created, you can always go back and edit the feature. When you edit an existing extrude featu
    11·1 answer
  • A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
    12·1 answer
  • How do computer worms spread​
    11·1 answer
  • Write a main method that prompts the user for an integer between 1 &amp; 20 (inclusive). If the user enters an invalid number, p
    8·1 answer
  • A tripod head can move vertically or horizontally. What term describes these movements?
    15·2 answers
  • Using a graphic organizer in the prewriting can do all of the following except what?
    9·1 answer
  • Describe practices that enable software designers to think about using patterns?
    10·1 answer
  • What section of the outline is represented by "A. Africa?"
    11·2 answers
  • Straight dinosaur walks out of woods : RAWWRRRR
    8·2 answers
  • How to fix this? Zoom it in to see it better
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!