1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
7

which of these is defined as the smallest unit of infromation in a table? -character -field -record -object

Computers and Technology
2 answers:
Greeley [361]3 years ago
4 0
Answer: character is the smallest into of information
sp2606 [1]3 years ago
3 0

Answer:

character

Explanation:

character is the smallest unit of an information. It is also equivalent to one byte.

field is the collection of the combination of characters that make up a single fact.

record is the collection of related fields.

You might be interested in
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
2. Design a class named Sandwich with data fields for description and price. Include a constructor that requires arguments for b
marta [7]

Answer:

The answer files have been attached below, with the description of the files in the explanation.

Explanation:

The Sandwich class contains two functions

1) Sandwich() : A constructor that takes two arguments, the Description of sandwich and its price.

2) display_Data(): A function that does not take any arguments, and does not return anything. It prints the states (data of the variables Description, Price )

The Delivery Sandwich has three functions:

1) DeliverySandwich(): A constructor that takes in three arguments, Description of sandwich, Its price, and the delivery address.

super key word is used to access the parent class. super() is a method of calling the parent class's constructor. Description and price are passed to parent class's constructor, where as DeliveryAddress is initialized in the DeliverySandwich constructor.

It is then checked whether the price is greater than 15. If it is, the deliveryfee is set to 3, otherwise it is set to 5.

2) display_Data()

This is an overridden function. An overridden function in java is a function that has the same name as another function in its parent's class, but has different functionality.

The function first calls the display_Data() of the parent class using super.display_Data() to display the price and description of sandwich, then prints the address and delivery price of the sandwich

3) main()

Driver code that has objects of both sandwiches. Once an object is created, the display data function is called of each class to see the states of the variables in them.

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
5 0
3 years ago
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
The functions of forums
coldgirl [10]

Answer:

The purpose of the forum is to talk about features that are currently in the game, whether they’re working, whether they’re not working, what we enjoy or dislike, what we would like to see in future, and what we would like to see less of, sharing tips and advice, and sharing creative stuff in the player content section.

Explanation:

Alliance wars is currently in beta testing. Anyone enrolled in the testing has their own access to a separate forum for discussion to discuss amongst themselves, and to provide feedback to the devs, on what is working and what isn’t. None of that information needs to be shared outside of the beta forum. Anyone NOT enrolled in the testing has no idea what is going on with it, so has no reason to be involved with discussing that side of things. If you don’t like that, you had your chance to apply the same as they did.

So yes, that thread should have been removed.

8 0
3 years ago
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Trava [24]

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
4 0
3 years ago
Other questions:
  • Two users, UserA and UserB, are engaging in secure communication using only asymmetrical encryption. UserA needs to send a secur
    11·1 answer
  • What is the best strategy to avoid paying interest on your credit card
    8·1 answer
  • If the point (9, 5) is translated 6 units left and 5 units up, then find the
    10·1 answer
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    12·1 answer
  • No careers combine more than one value
    7·1 answer
  • In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:
    13·1 answer
  • Write a program that creates a two-dimensional array named height and stores the following data:
    15·2 answers
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
  • Plz help me of this question​
    15·1 answer
  • Excel creates which type of cell references in formulas by default?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!