1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
10

Periodically adding, changing and deleting file records is called file. A) Updating B) Upgrading C) Restructuring D) Renewing E)

None of the above
Computers and Technology
2 answers:
Yakvenalex [24]3 years ago
8 0
The answer is updating , which is updating the contents of the of the records in a file speaking in terms of file organization and databases
igomit [66]3 years ago
4 0
Periodically adding, changing and deleting file records is called file updating. The correct answer is A. 
You might be interested in
The Python print function
dezoksy [38]

Answer:

"Causes text to be printed on the screen" is the right answer for the above question.

Explanation:

In a python programming language, the "print()" function is used to display the text or value of a variable (which is described as an argument of the "print()" function) on the screen. The syntax of the "print()" function is stated below--

print("value of text which needs to print on the screen");

Hence "Causes text to be printed on the screen" is the right answer because it means the same which described above while the other is not because--

  • "causes your printer to print out a page of paper" states that the "print()" function print a page with the help of printer but it is a wrong statement for print() function.
  • "saves data to a file on your disk" states that the print function is used to save the data on a disk but it is a wrong statement for print() function.
  • "none of the above" states that above-defined none options are correct but one option is correct.

7 0
3 years ago
________ sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network. A. Point-to-Po
nlexa [21]

Answer:

The correct answer is PPTP.

Explanation:

PPTP is the protocol that is used to create a connection which is referred to as tunnel and it transports data between two systems over the internet while also securing it with encryption. I hope this answer helps.

4 0
3 years ago
Write a program that deliberately contains an endless or infinite while loop. The loop should generate multiplication questions
Westkost [7]

Answer:

The Java code is given below with appropriate variable names for better understanding

Explanation:

import java.util.Random;

import java.util.Scanner;

public class MultiplicationQuestions {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       Random rand = new Random();

       int n1, n2, result, total = 0, correct = 0;

       char ch = 'y';

       while(ch == 'y'){

           n1 = 1 + rand.nextInt(9);

           n2 = 1 + rand.nextInt(9);

           System.out.print("What is "+n1+" * "+n2+" ? ");

           result = scan.nextInt();

           if(result==n1*n2){

               System.out.println("Correct. Nice work!");

               correct++;

           }

           else{

               System.out.println("Incorrect. The product is "+(n1*n2));

           }

           System.out.print("Want more questions y or n ? ");

           ch = scan.next().charAt(0);

           total++;

       }

       System.out.println("You scored "+correct+" out of "+total);

   }

}

3 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
2 years ago
When subjects are given two drinks but not told what they are drinking in order to get accurate results on which is the better t
Aneli [31]

Answer:

Blind.

Explanation:

In a blind experiment, information that can affect the participant's decision after the experiment is not told or we can say blinded until the experiment is over. Good blinding can eliminate experimental biases . A blind can be imposed on any participant.So in the question we conclude that it is blind experimental design.

7 0
3 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • A flowchart would be an example of what kind of programming?
    12·1 answer
  • What information is not typically included in an e-mail header?​?
    15·1 answer
  • Strong emotions can interfere with your ability to
    15·1 answer
  • The show ip dhcp binding command displays _____. (Points : 5) the MAC table cache information
    7·1 answer
  • . Define the process of Technological relationship
    12·1 answer
  • What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centi
    12·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • Apply the Fill - Teal, Accent 4, Soft Bevel text effect (the 5th
    12·1 answer
  • What are some of the most common obstacles in video games?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!