1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
4 years ago
9

Employee names are stored using a maximum of 50 characters. This information is an example of which of the following?

Computers and Technology
1 answer:
enyata [817]4 years ago
8 0

Answer: Data model

Explanation: Data model is the arrangement of the information in the form of table structure to maintain it in the form of database.They help in the keeping the entities in the sequence and can be tracked when required.Example- vendors records,customer record etc.

Other options are incorrect because the data retrieval is the regaining of the data from database, record instance is the parts of the database records  and meta data give knowledge about other data.

You might be interested in
What is the keyboard shortcut used to paste previously copied text?
Sedbober [7]

Answer:

command or control + c

Explanation:

6 0
3 years ago
Read 2 more answers
Hundreds of a bank’s customers have called the customer service call center to complain that they are receiving text messages on
Aleks [24]

Answer:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Explanation:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Some measures to be taken by both the banks and the customers are as follows;

  • The customers should be careful not to call any number people send to them rather they should get any information they need by going to the bank or search for such information on the bank official websites.
  • Customers should be alert and think carefully before sharing any financial details
  • For customers that responded to such messages, the banks will be proactive enough to shut it down and retrieve the customer's funds the same day.
  • Customers are advised to always report such fraudulent messages when received.
  • Banks should frequently verify transactions through telephone or text messages whenever an unusually high or out of the ordinary payments are flagged by its automated systems.
  • The bank can also prevent this fraud by blocking the customer card whenever an unusual transaction is noticed. The customer will then be contacted to confirm if the transaction was genuine or not. At times the transaction may need to be attempted again.

6 0
3 years ago
Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n
Jobisdone [24]

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

8 0
4 years ago
Which type of navigation involves multiple frames that are linked to a number of other frames?
Reptile [31]
The answer to the question is linear
6 0
3 years ago
Read 2 more answers
the function must find the substrings of s that start with a vowel and end with a consonant, then print the alphabetically first
PolarNik [594]

According to the parameters given in the questions above, the alphabetically lowest and highest substrings that start with a vowel and end with a Consonant is given below.

<h3>What is the determined substrings described above?</h3>

The determined substring is given by the following:

def findSubstrings(s):

   sub_strings_list=[]    #the required substrings list

   vowels=['a','e','i','o','u']    #vowels list

   for i in range(0,len(s)):    

       for j in range(i+1,len(s)+1):

           sub_string=s[i:j]    #slicing the original string into substring

           #checking whether the substring starts with a vowel and ends with a consonant

           if(sub_string[0] in vowels and sub_string[-1] not in vowels):    

               if(sub_string not in sub_strings_list):    #checking if the substring is already in the list

                   sub_strings_list.append(sub_string)    #if all conditions are satisfied adding the substring to the list

   sub_strings_list.sort()    #sorting the list alphabetically

   print(sub_strings_list[0])    #printing the first substring in the list

   print(sub_strings_list[-1])    #printing the last substring in the list

s=input()

findSubstrings(s)

Learn more about substrings:
brainly.com/question/21306076
#SPJ4

Full Question:

Consider a string, s — An alphabetically-ordered sequence Of Of s would be {"a", "ab•, "abc • , "bcu, If the sequence is reduced to only those substrings that start with a vowel and end with a consonant, the result is Cab", •abc"}. The alphabetically first element in this reduced list is •ab", and the alphabetically last element is "abc'. As a reminder:

Vowels: a, e, i, o, and u.

Consonants: b, c, d, f, g, h, i, k, l, m, n, p, q, r, s, t, v, w, x, y, and z.

For a given string, determine the alphabetically lowest and highest substrings that start with a vowel and end with a Consonant.

7 0
2 years ago
Other questions:
  • A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the
    11·1 answer
  • Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically
    14·1 answer
  • For this lab you will find the area of an irregularly shaped room with the shape as shown above.
    7·1 answer
  • What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
    5·1 answer
  • In order to estimate the percentage of defects in a recent manufacturing batch, a quality control manager at Intel selects every
    5·1 answer
  • Networking device converts analog signals to digital ones?
    8·1 answer
  • Computer memory uses different numbers of bytes to store different data types.
    7·1 answer
  • Aside from human user types, there are nonhuman user groups. Known as account types, __________ are implemented by the system to
    10·1 answer
  • Which entry by the user will cause the program to halt with an error statement?
    12·2 answers
  • States that processing power for computers would double every two years
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!