1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
3 years ago
10

Mobile app designers who work for themselves are often dubbed _____.

Computers and Technology
1 answer:
aev [14]3 years ago
5 0

Answer:

Appreneurs

Explanation:

An appreneur is an entrepreneur who works in the mobile device application industry and basically develop applications for the need of its own business.

You might be interested in
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
tester [92]

Answer:

A developer wants to take existing code written by another person and add some features specific to their needs.

Explanation:

pls Mark as Brain list

3 0
3 years ago
Kyle owns a growing delivery business. He would like to buy two more vans but first he needs to figure out related costs and his
guajiro [1.7K]

He will use a spreadsheet. hope this helped


4 0
4 years ago
Read 2 more answers
The head of small organization wants to install a network so that all the employees of different department can share various re
Firdavs [7]

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

4 0
3 years ago
Theo would like to apply formatting to record data based on values in comparison with values in other fields. Which option shoul
poizon [28]

Answer:

Conditional Formatting

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data when required or needed.

Conditional formatting is a feature found in a lot of spreadsheet software applications such as Microsoft Excel and it avails end users the ability to apply specific formatting options to cells based on certain defined criteria.

Basically, it is used for highlighting, emphasize, comparing or differentiating between data (information) stored in a spreadsheet document i.e data values that are lesser than or greater than a specificied value.

In this scenario, Theo would like to apply formatting to record data based on values in comparison with values in other fields. Thus, the option he should use is conditional formatting.

7 0
3 years ago
Read 2 more answers
In which situation would you typically use a stand-alone certificate authority (CA) in your public key infrastructure (PKI) desi
denpristay [2]
The animals have no place way to get go to sleep
5 0
3 years ago
Other questions:
  • Which native windows application allows one to access basic pc settings and controls system info?
    6·2 answers
  • When does a kernel panic occur?
    12·2 answers
  • A persons decision to take action without being asked is
    9·1 answer
  • The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
    14·1 answer
  • The R1 shell opens in a terminal window with black text and white background. What user is logged into
    8·1 answer
  • Write a program that reads an integer, and then prints the sum of the even and odd integers.
    8·1 answer
  • People who rely on others for financial support, such as children and the elderly, are referred to as 16 O A. recipients O B. be
    9·1 answer
  • 1. Which of the following cables are used in networking? Check all that apply.
    8·2 answers
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    6·2 answers
  • PLEASE HELP!!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!