1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
4 years ago
15

Select the correct answer.

Computers and Technology
1 answer:
grandymaker [24]4 years ago
8 0

10 numbers + 26 letters = 36 characters

log2 36 ~= 5.12 . The next integer is 6.


Answer : B) 6

You might be interested in
Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use i
choli [55]

Answer:

The answer is "audience aptitude and experience "

Explanation:

The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.

In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.

6 0
3 years ago
Dash is a collection of sequentially arranged slides put together in the from of a file​
cestrela7 [59]

Answer: Presentation

Explanation:

A presentation refers to the collection of sequentially arranged slides that are put together in the from of a file​.

Presentations are used by businesses and professional firms to inform, educate, and persuade the audiences. Companies use presentations to train their employees, and communicate with their clients by using words and images to engage them.

7 0
3 years ago
2. (8 points) When creating the Academic Database, there were several instances of data
Bad White [126]

Answer:

See explaination

Explanation:

An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.

One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.

One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.

Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.

8 0
4 years ago
As a student, why do you need to know and follow the steps printing a <br><br>document?​
Kazeer [188]
So I am able to print my math notes and keep up in geometry.
7 0
3 years ago
Read 2 more answers
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Other questions:
  • Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class.
    10·1 answer
  • Which examples demonstrate common Network Systems workplaces and employers? Check all that apply.
    13·2 answers
  • Are there any human lanaguages with context free grammar
    11·1 answer
  • 80 points two simple computer questions
    13·2 answers
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • Why information technology is important in healthcare?
    13·1 answer
  • What does Nicholas Carr suggest in his article "Is Google Making Us
    7·1 answer
  • 14 POINTS AND WILL ASWER BRAINIEST ANSWER ASAP TEST
    15·2 answers
  • What is text formatting/
    5·1 answer
  • Refer to Table 8-4. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of doll
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!