1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
11

A_________is a way for students to keep track of information during research.

Computers and Technology
1 answer:
Fudgin [204]3 years ago
4 0
Note pad your welcome


You might be interested in
Your mother wants to purchase a larger hard drive for her computer and asks you to see what type of drive interface she has. her
Darya [45]
Your mom has what is called a Parallel ATA interface. Her computer is very old and I suggest more than just a hard drive :)
5 0
3 years ago
Read 2 more answers
Design a class named Employee. The class should keep the following information in fields: Employee first name Employee last name
mixer [17]

Answer:

Explanation:

The following is written in Java and creates the Employee class with the variables requested and a getter setter method for each variable

package sample;

public class Employee {

   private String lastName, firstName, idNumber;

   

   public void Employee() {

   }

   public String getLastName() {

       return lastName;

   }

   public void setLastName(String lastName) {

       this.lastName = lastName;

   }

   public String getFirstName() {

       return firstName;

   }

   public void setFirstName(String firstName) {

       this.firstName = firstName;

   }

   public String getIdNumber() {

       return idNumber;

   }

   public void setIdNumber(String idNumber) {

       this.idNumber = idNumber;

   }

}

8 0
2 years ago
"re-type the celsius_to_kelvin function. Change the name to kelvin_to_celsius, and modify the function accordingly."
yanalaym [24]

You didn't include the original function, but the new function will contain something like:

function kelvin_to_celsius(k)

{

  return k - 273.15;

}

Depending of course on your programming language.

The outcome for negative Kelvin is undefined, you could test for that.


6 0
3 years ago
Read 2 more answers
Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
Tems11 [23]

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

8 0
3 years ago
Consider the two relations with their schemas as listed below: Employee(name, empID, birthDate, gender, address, phone) TaxAccou
Allushta [10]

Answer:

CREATE TABLE TaxAccount (

Name int NOT NULL,

SSN int NOT NULL,

empID int FOREIGN KEY REFERENCES employee(empID),

federalDeductionAmt int NOT NULL,

stateDeductionAmt int NOT NULL,

ficaDeductionAmt int NOT NULL

);

Explanation:

TaxAccount table will use the primary key of employees table 'empID' which will serve as foreign key in TaxAccount table.

Therefore TaxAccount table will look like this:

CREATE TABLE TaxAccount (

Name int NOT NULL,

SSN int NOT NULL,

empID int FOREIGN KEY REFERENCES employee(empID),

federalDeductionAmt int NOT NULL,

stateDeductionAmt int NOT NULL,

ficaDeductionAmt int NOT NULL

);

5 0
3 years ago
Other questions:
  • 1. Engineers should not consult with experts if they do not know much about a problem.
    12·1 answer
  • Why is soccer the most popular sport
    7·2 answers
  • Describe how computer is in the last 35 years
    6·1 answer
  • My ar goal is 16.3 what percent am i at if i have 3 points??
    8·1 answer
  • "running computer programs and their data are stored in ___"
    10·2 answers
  • What are the features of the Outline view in Word? Select three options.
    12·2 answers
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • Jim is writing a program to calculate the wages of workers in a teddy bear factory.
    7·1 answer
  • What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How mig
    5·1 answer
  • Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!