1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
3 years ago
14

Which best describes what databases do?

Computers and Technology
2 answers:
lutik1710 [3]3 years ago
7 0
They guarantee users find needed data
IRINA_888 [86]3 years ago
4 0

Answer:

a. they guarantee users find needed data.

You might be interested in
Which of the following statements is correct?
quester [9]

Answer:

hmm... sorry I don't know

4 0
2 years ago
Read 2 more answers
I want to do is speed test to do i go to for my computer
sdas [7]

speedtest.net

Explanation:

aaaaads

8 0
3 years ago
Read 2 more answers
Write a statement that adds 1 to the variable reverseDrivers if the variable speed is less than 0,adds 1 to the variable parkedD
ch4aika [34]

Answer:

The c++ coding for this scenario is given below.

if( speed < 0 )

       reverseDrivers = reverseDrivers + 1;

   else if( speed >= 0 && speed < 1 )

       parkedDrivers = parkedDrivers + 1;

   else if( speed >= 1 && speed < 40 )

       slowDrivers = slowDrivers + 1;

   else if( speed >= 40 && speed <= 65 )

       safeDrivers = safeDrivers + 1;

   else

       speeders = speeders + 1;

Explanation:

First, five integer variables are declared and initialized.

int reverseDrivers = 0, parkedDrivers = 0, slowDrivers = 0, safeDrivers = 0, speeders = 0;

All the above variables need to be incremented by 1 based on the given condition, hence, these should have some original value.

Another variable speed of data type integer is declared.

int speed;

The variable speed is initialized to any value. User input is not taken for speed since it is not mentioned in the question.

Based on the value of the variable speed, one of the five variables, declared in the beginning, is incremented by 1.

The c++ program to implement the above scenario is as follows.

#include <iostream>

using namespace std;

int main() {

   int reverseDrivers = 0, parkedDrivers = 0, slowDrivers = 0, safeDrivers = 0, speeders = 0;

   int speed = 34;    

   if( speed < 0 )

   {

       reverseDrivers = reverseDrivers + 1;

       cout << " reverseDrivers " << endl;

   }

   else if( speed >= 0 && speed < 1 )

   {

       parkedDrivers = parkedDrivers + 1;

      cout << " parkedDrivers " << endl;

   }

   else if( speed >= 1 && speed < 40 )

   {

       slowDrivers = slowDrivers + 1;

      cout << " slowDrivers " << endl;

   }

   else if( speed >= 40 && speed <= 65 )

   {

       safeDrivers = safeDrivers + 1;

       cout << " safeDrivers " << endl;

   }

   else

   {

       speeders = speeders + 1;

       cout << " speeders " << endl;

   }    

return 0;

}

The program only outputs the variable which is incremented based on the value of the variable speed.

OUTPUT

slowDrivers

3 0
3 years ago
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
vesna_86 [32]

In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

<h3>What is a person in the middle attack?</h3>

A man-in-the-middle (MiTM) attack is  known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.

Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

Se full question below

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Which type of hacking attack is Amber perpetrating?

a. A denial-of-service attack

b. A man-in-the-middle attack

c. A drive-by attack

d. A malware attack

Learn more about hacking attack from

brainly.com/question/7065536

#SPJ1

4 0
2 years ago
Write a java program that will take 2 String inputs and perform the following operation on them: a) Show length of the strings b
marissa [1.9K]

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

 // scanner object to read input from user

Scanner scr=new Scanner(System.in);

 // string variables

String st1,st2;

System.out.print("enter the first string:");

 // read the first string

st1=scr.nextLine();

System.out.print("enter the second string:");

 // read the second string

st2=scr.nextLine();

// part (a)

 // find length of each string

System.out.println("length of first string is: "+st1.length());

System.out.println("length of second string is: "+st2.length());

//part(b)

 // concatenate both the string

System.out.print("after Concatenate both string: ");

System.out.print(st1+st2);

// part(c)

 // convert them to upper case

System.out.println("first string in upper case :"+st1.toUpperCase());

System.out.println("second string in upper case :"+st2.toUpperCase());

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read two strings st1 and st2 with scanner object.In part a, find the length of each string with the help of .length() method and print the length.In part b, concatenate both the string with + operator.In part c, convert each string to upper case with the help of .toUpperCase()  method.

Output:

enter the first string:hello

enter the second string:world!!

length of first string is: 5

length of second string is: 7

after Concatenate both string: hello world!!

first string in upper case :HELLO

second string in upper case :WORLD!!

6 0
3 years ago
Other questions:
  • At what point is an idea protected by copyright?
    7·2 answers
  • You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you ha
    15·2 answers
  • Which of the following features of a network connection between a switch and server is not improved by link aggregation?
    6·1 answer
  • When inserting a fly in animation what is the first step in the process?
    8·1 answer
  • When parking uphill on a street with no curb, how should your front wheels be positioned? A. Turned to the left (toward the stre
    14·2 answers
  • Today, the Nielsen Television Index provides weekly estimates of networks and major cable viewing audiences on a national level
    6·2 answers
  • History timeline: who developed what elements first Windows OS and Apple OS?
    13·2 answers
  • Most jobs in computer disciplines require which minimum level of education?
    12·2 answers
  • You work part-time at a computer repair store, and you are on-site at a customer's premises. Your customer has signed up for DSL
    5·1 answer
  • You want to store, organize, and manipulate your photos. what type of software do you need?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!