Answer:
1. Capacitor.
2. Inductor.
3. Resistor.
4. Battery.
5. Transistor.
Explanation:
1. <u>Capacitor</u>: this component stores a temporary charge.
2. <u>Inductor</u>: this component stores electric energy in the form of a magnetic field.
3. <u>Resistor</u>: this component prevents components from overheating.
4. <u>Battery</u>: this component produces electricity by converting chemical energy into electric energy.
5. <u>Transistor</u>: the voltage applied to the base can control the current that flows across the emitter and collector.
Answer:
The answer to this question is given below in the explanation section
Explanation:
The correct option to this question is D.
A database record can be best described as the collection of information consisting of one or more related fields about a specific entity. Because a database record represents a record about a specific entity for example a student record studying in a school. A student is a specific entity in the database and it has one or more related fields, for example, name, class, courses in which enrolled etc.
others options are not correct because:
A: a database record is a collection of data about a specific entity and it is not about a limited topic.
B: all database records can be sorted and searched using search algorithms but it is not necessarily because you can search data sometimes using quarries etc.
C: a database record is not a category of information in a table but it is a collection of one or more related field about a specific entity.
Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
I included my code in the picture below. Best of luck.