1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
6

Which is the correct order for arranging these numbers in terminal-digit filing order? 30 15 39 87 39 64 12 46 33 16 75 24 30 15

39 12 46 33 16 75 24 87 39 64 12 46 33 16 75 24 30 15 39 87 39 64 16 75 24 12 46 33 30 15 39 87 39 64
Computers and Technology
1 answer:
Pavel [41]3 years ago
8 0

Answer:

16 75 24

12 46 33

30 15 39

87 39 64

Explanation:

You might be interested in
Bonjour ma question est: expliquer comment fonctionne une calculatrice qui ne contient pas une pile. Pouvez-vous m'aider?
larisa [96]

Answer:

Tout calculateur électronique ou numérique nécessite une source d'alimentation pour fonctionner, avec son circuit configuré à la porte logique requise liée aux touches d'entrée et à l'écran de sortie.

Explanation:

Les calculatrices sont des appareils utilisés pour les calculs arithmétiques. Au 19ème siècle, les calculatrices étaient mécaniques et n'utilisaient pas de batterie, elles étaient encombrantes et utilisaient des tiges et des engrenages dans leur fonctionnement. Les calculatrices récentes sont électroniques, alimentées par une batterie. Ils comprennent un circuit électronique configuré à sa porte logique requise pour le calcul, un bouton pour l'entrée et un écran pour la sortie du calcul.

6 0
3 years ago
the 4gl languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a dat
Mademuasel [1]

The 4gl languages that enable non-programmers to use certain easily understood commands to search and generate reports from a database are called <u>query</u>.

<h3>What is 4gl?</h3>

A computer programming language that is part of a class that is intended to improve upon third-generation programming languages (3GL) is known as a fourth-generation programming language (or 4GL).

Every generation of programming language strives to provide a greater level of abstraction of the internal workings of the computer hardware, making the language more user-friendly, potent, and adaptable.

Despite the fact that the definition of 4GL has evolved over time, it can still be characterized by the fact that it works more with large groups of data at once rather than concentrating on just bits and bytes.

The support for report generation, database management, mathematical optimization, GUI development, and web development may be found in languages that advertise themselves as 4GL. According to some academics, domain-specific languages include 4GLs as a subset.

Learn more about 4GL

brainly.com/question/9978575

#SPJ4

3 0
1 year ago
What do you think that private information like passwords pin number will be guarded or shared with the public? why?
konstantin123 [22]

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

<h3>Why should you use passwords to protect private information?</h3>

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

brainly.com/question/17174600

#SPJ1

4 0
2 years ago
Which key must you press after you write into a cell?
fiasKO [112]
Hit the return key after you type in a cell
6 0
3 years ago
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
2 years ago
Other questions:
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • Choosing firm goals for your business
    7·2 answers
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • A girl scout troop with 10 girl scouts and 2 leaders goes on a hike. When the path narrows, they must walk in single file with a
    12·1 answer
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • A ________ topology uses more than one type of topology when building a network. crossover multiple-use fusion hybrid
    11·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • What is a thoughtware​
    7·1 answer
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!