1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
14

Variable-length entities. fixed-length entities. data structures that contain up to 10 related data items. used to draw a sequen

ce of lines, or "rays.
Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
7 0
If this is a given definition, the term is "array". 
You might be interested in
In 2-5 paragraphs, describe how you would create a new database using your software.
Nikitich [7]

Answer:

1. open the software

2. select a new blank database or database wizard

3. name the database

4. enter field names and select the type of field (text, number, date, currency)

5. make one of the fields the primary key

6. click done, or save and close

7. open the table and add records

5 0
3 years ago
WHY IS BRAINLY NOTIFICATIONS LIKE THIS?????
nikdorinn [45]

Answer:

probly the wifi connection

Explanation:

4 0
3 years ago
Read 2 more answers
What is the job title of someone who works with video and/or film?
boyakko [2]
Producer, videographer
4 0
4 years ago
Which of the following documents should beprepared before the commencement of a softwareproject?
ludmilkaskok [199]

Answer:

Software requirement specification

Explanation:

requirement specification is the first step before proceeding with any project.

we should validate our output at all phases with software requirement specification

7 0
3 years ago
Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
hjlf

Answer:

To avoid receiving malware-infected files like spam.

Explanation:

Hackers use malware to gain unauthorized access to company files and information for personal gain. Files infected by the malware can infect other systems or files. There are various types of malware namely; virus, trojan horse, worm, spyware, ransomware, adware etc.

5 0
3 years ago
Other questions:
  • Richman Investments is an investment and consulting firm. Richman wants to expand its business operations both in the U.S. and i
    14·1 answer
  • Cyberlaw consists of: a. only state statutes. b. only federal statutes. c. traditional legal principles that have changed becaus
    6·1 answer
  • When you collaborate or meet with a person or group online, it is called
    12·2 answers
  • Which of the following is true of how packets are sent through the Internet?
    11·2 answers
  • Write a program that prompts the user to enter the center and a point on the circle. The program should then output the circle’s
    9·1 answer
  • Just as arrays can only have a, set at the time the array is declared, a parameter list also can only have a fixed number of ele
    5·1 answer
  • I AM GIVING BRAINLEST!!!!!!!!
    14·2 answers
  • Date
    6·1 answer
  • What is gland? mention it's type​
    15·2 answers
  • Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change. Which one o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!