1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
9

____________________ is the primary code humans use to communicate. (Points : 1

Computers and Technology
1 answer:
nordsb [41]3 years ago
4 0
I can't truly answer the question, but I believe it may be Language.
You might be interested in
Suppose that we pick the following three tuples from a legal instance of a relation S (S has 100 tuples in total). Relation S ha
AysviL [449]

Answer:

The correct answer is BC → A, A does not hold over S. we noticed the tuples (1 ,2 ,3 ) and (4 ,2 ,3) which can hold over S)

Explanation:

Solution

No, since in this case the instance of S is provided. so such particular dependencies are unable to breach through such instance, but unable to tell which the dependencies hold towards S.

A functional dependency holds towards only when a relation forms a statement regarding the complete allowed instances of relation.

8 0
3 years ago
In a relational database, the three basic operations used to develop useful sets of data are:
lesya692 [45]
<span>Which is not a component of a database that describes how data is stored?</span>
6 0
3 years ago
In Criminal justice, the type of evidence which contradicts a given theory is known as?​
irina [24]

Answer:

In general, scientific evidence are the results of scientific tests used to prove or disprove a theory or hypothesis. In criminal cases, scientific evidence is used to help jurors understand and determine the facts of a case. Explanation:

3 0
2 years ago
What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys? Multiple
frosja888 [35]

Answer: Simple-locker

Explanation:Simple-locker is the program that works on the technique in which it automatically encrypts the data or files and then demand a certain ransom or money from the user for the decryption of that data. It works on the function to gain the ransom or incentive in the financial form.

The decryption can only be carried out in safe way when the victim has the key to decrypted data or file.

5 0
3 years ago
How does this happen on brainly????
Trava [24]

what do you mean????

4 0
2 years ago
Read 2 more answers
Other questions:
  • What is the full meaning of ICT
    14·2 answers
  • The set of instructions that directs the computer to perform a variety of tasks is known as a
    9·1 answer
  • Which tab provide text formatting features
    11·1 answer
  • Write a program that utilizes the concept of conditional execution, takes a string as input, and: prints the sentence "Yes - Spa
    8·1 answer
  • Write a cash register program that calculates change for a restaurant of your choice. Your program should include: Ask the user
    11·1 answer
  • Describe markings on a road that indicate that it is safe to pass.
    10·1 answer
  • When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
    7·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • In ____, two or more disk drives become one large volume, so the computer views the disks as a single disk.
    13·1 answer
  • Can someone please explain to me how the points work when you ask a question? Worth 30 points I think, I still don't know how th
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!