1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
3 years ago
7

The programs in a computer are called

Computers and Technology
1 answer:
lisov135 [29]3 years ago
6 0

Answer:

Software

Explanation:

You might be interested in
Given the following data definition
Mashcka [7]

Answer:

Array + 36.

Explanation:

The array contains the address of the first element or the starting address.So to find the address of an element we to add the size*position to the starting address of the array.Which is stored in the variable or word in this case.

There are 9 elements in the array and the size of integer is 4 bytes.So to access the last element we have to write

array + 4*9

array+36

4 0
3 years ago
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. manipulation
Ira Lisetskai [31]

Answer:

definition

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Hence, the data definition component of a database management system (DBMS) is used to create and maintain the data dictionary.

6 0
3 years ago
If a node receives a frame and the calculated CRC does not match the CRC in the FCS,
Basile [38]

Answer:

It drops the frame

Explanation:

The FCS stands for the frame check sequence, and it is nothing else but an error-detecting code which is added to the frame ( communication protocol). However, the frames are being used for sending the payload data via a source to a certain destination. And if the CRC is not correct, or that does not match the CRC of the FCS then it confirms that the sequence is not correct, and FCS drops that frame.

5 0
3 years ago
1. an image can be stored either in a vector graphic file or in a bitmap file true or false
lions [1.4K]

Answer:

1 true 2 true 3 false 4 true

Explanation:

7 0
3 years ago
What does EDI stand for?
Georgia [21]
Electronic data interchange
4 0
3 years ago
Read 2 more answers
Other questions:
  • How many degrees of freedom does any unconstrained object have in 3-D modeling?
    6·1 answer
  • ______is a multimodal application software platform. the centrealized and shared database system ties the entire organization to
    14·1 answer
  • A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows S
    14·1 answer
  • Engineers and scientists redesign a prototype if it does not work correctly true or false and why
    10·2 answers
  • Describe the cutting-edge program that is referred to as agile
    5·1 answer
  • Match each role to the corresponding web development task.
    14·1 answer
  • What is the difference between a threat and an attack?
    7·1 answer
  • In which situation would Accenture apply principles of Responsible Artificial Intelligence (AI)?
    9·1 answer
  • A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
    15·2 answers
  • What do you believe the year 2058 will be like? Reply with a link or a picture along with an explanation why. There should be a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!