1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
14

What type of database contains multiple collections of data that are related to one another cells

Computers and Technology
1 answer:
statuscvo [17]3 years ago
7 0
The different types<span> of </span>databases<span> include operational </span>databases<span>, end-user </span>databases<span>, distributed </span>databases<span>, analytical </span>databases<span>, relational </span>databases<span>, hierarchical </span>databases<span> and </span>database<span> models. 

Source Bing</span>
You might be interested in
Creating calendar events prevents individuals from being able to schedule a time to collaborate.
Yuliya22 [10]

Answer:

False because calender events help a person remeber when s/he has a event happening that day!

6 0
3 years ago
Write a function named replace_at_index that takes a string and an integer. The function should return a new string that is the
aalyn [17]

Answer:

def replace_at_index(str, number):

   new = str.replace(str[number], "-")

   return new

print(replace_at_index("eggplant", 3))

Explanation:

- Create a function called <em>replace_at_index</em> that takes a string and an integer

- Initialize a new variable called <em>new</em>, that will hold the new string

- Replace the character at given index with dash using <em>replace</em> function, it takes two parameters: the first is the character we want to replace, the second is the new character.

- Return the new string

- Call the function with the required inputs

4 0
2 years ago
What does the machine do and how do the operators react to their work?
Stels [109]

Answer:

The answer is below

Explanation:

Machine functions or does the following:

1.  Transform energy

2.  Change force direction

3.  Increase or decrease speed

4.  Move force over a distance.

Machine operator reacts to their work in the following ways:

1.  Setting the machine for use

2.  Utilizing the machine effectively

3.  Performing machine maintenance

4.  Ensuring maximum optimization of the machine

6 0
3 years ago
You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it fr
DENIUS [597]

Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

<h3>What is  POP3 about ?</h3>

POP3 is known to be a tool that gives one room to be able to download email to a single device, which a person want to use if they want to add privacy to their emails.

Therefore, Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

Learn more about email from

brainly.com/question/24688558

#SPJ1

8 0
2 years ago
IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)​
spin [16.1K]

Answer:

The correct syntax (assuming WinForms) is

lblMessage.Text = "Welcome to fiji";

The given statement fails to follow the syntax of literal strings, which should be in quotation marks. (depending on the framework and programming language, the txt property may also be incorrect, as well as the missing semi-colon).

8 0
3 years ago
Other questions:
  • Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute
    11·1 answer
  • Which is a function of network media?
    11·2 answers
  • The expression 10,785(1.0275)x represents the amount of money in an investment account with interest that compounds annually for
    14·2 answers
  • The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platf
    13·1 answer
  • The advent of optical discs was made possible by developments in ____ technology.
    5·1 answer
  • How can you specify a page has the highest priority?
    7·1 answer
  • A hacker uses a valid IP address of an internal host, and then from an external system, the hacker attempts to establish a commu
    11·1 answer
  • Please help me I don’t know what to do
    13·2 answers
  • Help fast plzzzzzzzzzzzz ​
    10·2 answers
  • Prokaryotes are __________________ and include ________________________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!