1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
14

What is a scenario where records stored in a computer frequently need to be checked

Computers and Technology
2 answers:
vazorg [7]3 years ago
7 0

if your in  school and always are getting into trouble the school will always be checking your records


algol133 years ago
7 0
I would say the same thing as the first answer... you’re welcome
You might be interested in
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. Group of answer choices using the letter
Firdavs [7]

The setup of keys on a keyboard, QWERTY shows the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys.

<h3>What is keyboard?</h3>

A keyboard is known to be a kind of peripheral device that helps a user to be able to input text into any computer or any any kind of electronic device.

Note that The setup of keys on a keyboard, QWERTY shows the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys.

Learn more about keyboard from

brainly.com/question/13380788

#SPJ1

8 0
2 years ago
How do I charge my ACDC Halo bolt?
adoni [48]

Answer:

To recharge your HALO Bolt, using the provided AC wall adapter cable, plug the AC adapter tip into the charger's charge input DC 20V/0.6A port. Next, connect the AC adapter into a wall outlet. Your HALO Bolt will automatically begin charging. Charge your HALO Bolt for a full eight hours.

Explanation:

4 0
3 years ago
The underline format will underline ____.
alisha [4.7K]
<span>The underline format will underline </span>the selected text
7 0
3 years ago
You should process the tokens by taking the first letter of every fifth word,starting with the first word in the file. Convert t
zhenek [66]

Answer:

See explaination

Explanation:

import java.io.File;

import java.io.IOException;

import java.util.Scanner;

import java.util.StringTokenizer;

public class SecretMessage {

public static void main(String[] args)throws IOException

{

File file = new File("secret.txt");

StringBuilder stringBuilder = new StringBuilder();

String str; char ch; int numberOfTokens = 1; // Changed the count to 1 as we already consider first workd as 1

if(file.exists())

{

Scanner inFile = new Scanner(file);

StringTokenizer line = new StringTokenizer(inFile.nextLine()); // Since the secret.txt file has only one line we dont need to loop through the file

ch = line.nextToken().toUpperCase().charAt(0); // Storing the first character of first word to string builder as mentioned in problem

stringBuilder = stringBuilder.append(ch);

while(line.hasMoreTokens()) { // Looping through each token of line read using Scanner.

str= line.nextToken();

numberOfTokens += 1; // Incrementing the numberOfTokens by one.

if(numberOfTokens == 5) { // Checking if it is the fifth word

ch = str.toUpperCase().charAt(0);

stringBuilder = stringBuilder.append(ch);

numberOfTokens =0;

}

}

System.out.println("----Secret Message----"+ stringBuilder);

}

}

}

5 0
3 years ago
What is the slowest shutter speed?
crimeas [40]

Answer: I think the answer would be 1/30 or 1/60

Explanation: Anything below 1/90 is considered a soft image so i would go with 1/30 Brainliest ans plz.

7 0
4 years ago
Other questions:
  • For each MIPS instruction, show the value of the opcode (OP), source register (RS), and target register (RT) fi elds. For the I-
    13·1 answer
  • (It science question)
    9·1 answer
  • To hide gridline when you display or print a worksheet
    14·1 answer
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • Help me plase will give brainliest
    12·2 answers
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    6·2 answers
  • A simulation system is a technology that enables you to take over a customer’s screen, mouse, or other connected device in order
    13·1 answer
  • 4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations
    5·1 answer
  • Which devices are used in networking
    15·1 answer
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!